Abstract
In this paper, a novel multiple-level secret image sharing scheme is proposed, which achieves the additional steganography, the authentication, and the scalable abilities. The key idea is that the secret image is revealed at different quality levels with the different priorities. Specifically, based on the weight function and Shamir’s secret sharing, the meaningful shadow images are distributed among the different level participants, and the participants with the higher priority are capable of revealing more information about the secret image. Meanwhile, the proposed scheme enables the cover images to be losslessly restored. Besides, the secret image can be progressively revealed when more participants of the different levels cooperate together. Moreover, the verifiable correctness of the shadow images prevents from cheating among the participants before the recovery of the secret image.
Similar content being viewed by others
Reference
Chang CC, Hsieh YP, Lin CH (2008) Sharing secrets in stego images with authentication. Pattern Recogn 41(10):3130–3137
Chang CC, Lin CC, Le THN et al (2009) Sharing a verifiable secret image using two shadows. Pattern Recogn 42(11):3097–3114
Guo C, Chang CC, Qin C (2012) A hierarchical threshold secret image sharing. Pattern Recogn Lett 33(1):83–91
Huang CP, Hsieh CH, Huang PS (2010) Progressive sharing for a secret image. J Syst Softw 83(3):517–527
Lee J S, Chen Y R (2015) Selective scalable secret image sharing with verification. Multimedia Tools and Applications. 1–11
Lin CC, Tsai WH (2004) Secret image sharing with steganography and authentication. J Syst Softw 73(3):405–414
Lin SJ, Chen ST, Lin JC (2009) Fast-weighted secret image sharing. Opt Eng 48(7):077008 -077008-7
Liu W, Wang A, Chang CC et al (2014) A grouped-scalable secret image sharing scheme. Multimedia Tools and Applications 74(17):1–15
Nikov V, Nikova S (2005) On proactive secret sharing schemes. Lect Notes Comput Sci 3357:314–331
Pakniat N, Noroozi M, Eslami Z (2014) Secret image sharing scheme with hierarchical threshold access structure. J Vis Commun Image Represent 25(5):1093–1101
Pan X, Meng X, Wang Y et al (2014) Multilevel image authentication using shared secret threshold and phase retrieval. J Mod Opt 61(18):1470–1478
Patil S, Deshmukh, P (2014) Verifiable image secret sharing in matrix projection using watermarking. International Conference on Circuits, Systems, Communication and Information Technology Applications. IEEE. 225–229
Rose AA, Thampi SM (2015) A secure verifiable scheme for secret image sharing. Procedia Computer Science 58:140–150
Safarpour M, Charmi M, Toofan S et al (2015) A new scalable image sharing scheme based on compressed sensing. Information and Knowledge Technology, IEEE
Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613
Tassa, Tamir (2004) Hierarchical threshold secret sharing. Theory of Cryptography, First Theory of Cryptography Conference, TCC, Cambridge, MA, USA, February 19-21, 2004, Proceedings 2004:473–490
Thien CC, Lin JC (2002) Secret image sharing. Comput Graph 26(5):765–770
Ulutas M, Ulutas G, Nabiyev VV (2015) Secret image sharing with enhanced visual quality and authentication mechanism. Imaging Science Journal the 4(59):154–165
Wang RZ, Shyu SJ (2007) Scalable secret image sharing. Signal Processing Image Communication 22(4):363–373
Wu CC, Kao SJ, Hwang MS (2011) A high quality image sharing with steganography and adaptive authentication scheme. J Syst Softw 84(12):2196–2207
Xia Z, Wang X, Zhang L et al (2016) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Transactions on Information Forensics and Security 1-1
Yang CN, Chu YY (2011) A general (k, n) scalable secret image sharing scheme with the smooth scalability. J Syst Softw 84(10):1726–1733
Yang CN, Huang SM (2010) Constructions and properties of k out of n scalable secret image sharing. Opt Commun 283(9):1750–1762
Yang CN, Chen TS, Yu KH et al (2007) Improvements of image sharing with steganography and authentication. J Syst Softw 80(7):1070–1076
Yang CN, Ouyang JF, Harn L (2012) Steganography and authentication in image sharing without parity bits. Opt Commun 285(7):1725–1735
Acknowledgements
Project supported by the Natural Science Foundation of China (Nos. 61363069, 61662016, 61301166, 61672029 ), Guangxi Colleges and Universities Key Laboratory of Intelligent Processing of Computer Images and Graphics (No. GIIP201604), Foundation of Guangxi Bureau of Education(ky2016YB155), High Level Innovation Team of Guangxi Colleges and Universities, and the Innovation Project of Guangxi Graduate Education (No. YCSZ2015149).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Liu, YN., Zhong, Q., Xie, M. et al. A novel multiple-level secret image sharing scheme. Multimed Tools Appl 77, 6017–6031 (2018). https://doi.org/10.1007/s11042-017-4512-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-017-4512-5