Skip to main content
Log in

A novel multiple-level secret image sharing scheme

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, a novel multiple-level secret image sharing scheme is proposed, which achieves the additional steganography, the authentication, and the scalable abilities. The key idea is that the secret image is revealed at different quality levels with the different priorities. Specifically, based on the weight function and Shamir’s secret sharing, the meaningful shadow images are distributed among the different level participants, and the participants with the higher priority are capable of revealing more information about the secret image. Meanwhile, the proposed scheme enables the cover images to be losslessly restored. Besides, the secret image can be progressively revealed when more participants of the different levels cooperate together. Moreover, the verifiable correctness of the shadow images prevents from cheating among the participants before the recovery of the secret image.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Reference

  1. Chang CC, Hsieh YP, Lin CH (2008) Sharing secrets in stego images with authentication. Pattern Recogn 41(10):3130–3137

    Article  MATH  Google Scholar 

  2. Chang CC, Lin CC, Le THN et al (2009) Sharing a verifiable secret image using two shadows. Pattern Recogn 42(11):3097–3114

    Article  MATH  Google Scholar 

  3. Guo C, Chang CC, Qin C (2012) A hierarchical threshold secret image sharing. Pattern Recogn Lett 33(1):83–91

    Article  Google Scholar 

  4. Huang CP, Hsieh CH, Huang PS (2010) Progressive sharing for a secret image. J Syst Softw 83(3):517–527

    Article  Google Scholar 

  5. Lee J S, Chen Y R (2015) Selective scalable secret image sharing with verification. Multimedia Tools and Applications. 1–11

  6. Lin CC, Tsai WH (2004) Secret image sharing with steganography and authentication. J Syst Softw 73(3):405–414

    Article  Google Scholar 

  7. Lin SJ, Chen ST, Lin JC (2009) Fast-weighted secret image sharing. Opt Eng 48(7):077008 -077008-7

    Article  Google Scholar 

  8. Liu W, Wang A, Chang CC et al (2014) A grouped-scalable secret image sharing scheme. Multimedia Tools and Applications 74(17):1–15

    Google Scholar 

  9. Nikov V, Nikova S (2005) On proactive secret sharing schemes. Lect Notes Comput Sci 3357:314–331

    MathSciNet  MATH  Google Scholar 

  10. Pakniat N, Noroozi M, Eslami Z (2014) Secret image sharing scheme with hierarchical threshold access structure. J Vis Commun Image Represent 25(5):1093–1101

    Article  Google Scholar 

  11. Pan X, Meng X, Wang Y et al (2014) Multilevel image authentication using shared secret threshold and phase retrieval. J Mod Opt 61(18):1470–1478

    Article  Google Scholar 

  12. Patil S, Deshmukh, P (2014) Verifiable image secret sharing in matrix projection using watermarking. International Conference on Circuits, Systems, Communication and Information Technology Applications. IEEE. 225–229

  13. Rose AA, Thampi SM (2015) A secure verifiable scheme for secret image sharing. Procedia Computer Science 58:140–150

    Article  Google Scholar 

  14. Safarpour M, Charmi M, Toofan S et al (2015) A new scalable image sharing scheme based on compressed sensing. Information and Knowledge Technology, IEEE

    Book  Google Scholar 

  15. Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613

    Article  MathSciNet  MATH  Google Scholar 

  16. Tassa, Tamir (2004) Hierarchical threshold secret sharing. Theory of Cryptography, First Theory of Cryptography Conference, TCC, Cambridge, MA, USA, February 19-21, 2004, Proceedings 2004:473–490

  17. Thien CC, Lin JC (2002) Secret image sharing. Comput Graph 26(5):765–770

    Article  Google Scholar 

  18. Ulutas M, Ulutas G, Nabiyev VV (2015) Secret image sharing with enhanced visual quality and authentication mechanism. Imaging Science Journal the 4(59):154–165

    MATH  Google Scholar 

  19. Wang RZ, Shyu SJ (2007) Scalable secret image sharing. Signal Processing Image Communication 22(4):363–373

    Article  Google Scholar 

  20. Wu CC, Kao SJ, Hwang MS (2011) A high quality image sharing with steganography and adaptive authentication scheme. J Syst Softw 84(12):2196–2207

    Article  Google Scholar 

  21. Xia Z, Wang X, Zhang L et al (2016) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Transactions on Information Forensics and Security 1-1

  22. Yang CN, Chu YY (2011) A general (k, n) scalable secret image sharing scheme with the smooth scalability. J Syst Softw 84(10):1726–1733

    Article  Google Scholar 

  23. Yang CN, Huang SM (2010) Constructions and properties of k out of n scalable secret image sharing. Opt Commun 283(9):1750–1762

    Article  Google Scholar 

  24. Yang CN, Chen TS, Yu KH et al (2007) Improvements of image sharing with steganography and authentication. J Syst Softw 80(7):1070–1076

    Article  Google Scholar 

  25. Yang CN, Ouyang JF, Harn L (2012) Steganography and authentication in image sharing without parity bits. Opt Commun 285(7):1725–1735

    Article  Google Scholar 

Download references

Acknowledgements

Project supported by the Natural Science Foundation of China (Nos. 61363069, 61662016, 61301166, 61672029 ), Guangxi Colleges and Universities Key Laboratory of Intelligent Processing of Computer Images and Graphics (No. GIIP201604), Foundation of Guangxi Bureau of Education(ky2016YB155), High Level Innovation Team of Guangxi Colleges and Universities, and the Innovation Project of Guangxi Graduate Education (No. YCSZ2015149).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yi-Ning Liu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, YN., Zhong, Q., Xie, M. et al. A novel multiple-level secret image sharing scheme. Multimed Tools Appl 77, 6017–6031 (2018). https://doi.org/10.1007/s11042-017-4512-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4512-5

Keywords

Navigation