Skip to main content

Part of the book series: Lecture Notes in Computer Science ((TDHMS,volume 8363))

Abstract

In this paper, a novel perceptual secret sharing model namely PSS model is defined. Then, a general (1, k out of n) PSS scheme is proposed based on maximum likelihood estimation (MLE). The proposed model has a large number of valuable features that previous secret sharing schemes fail to have. Furthermore, the proposed PSS scheme satisfies P (l, k, n) threshold mechanism which means that no perceptual information of the secret data will be revealed when the number of shadows is less than l, the degraded perceptual quality will be recovered when the number of shadows is greater than or equal to l and less than k, the more shadows the better recovered perceptual quality will be. Lossless perceptual quality will be recovered when the number of shadows is greater than or equal to k and less than or equal to n that could control access for different owners. This property will be useful for prominent prevalence in real applications like pay-per-view videos, Pay- TV/Music and art-work image vending, video on demand (VOD), etc.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chen, T.H., Tsao, K.H.: Threshold visual secret sharing by random grids. J. Syst. Softw. 84(7), 1197–1208 (2011)

    Article  Google Scholar 

  2. Zhou, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography. IEEE Trans. Image Process. 15(8), 2441–2453 (2006)

    Article  Google Scholar 

  3. Wang, D., Zhang, L., Ma, N., Li, X.: Two secret sharing schemes based on boolean operations. Pattern Recognit. 40(10), 2776–2785 (2007)

    Article  MATH  Google Scholar 

  4. Wang, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography via error diffusion. IEEE Trans. Inf. Forensics Security 4(3), 383–396 (2009)

    Article  Google Scholar 

  5. Yi, F., Wang, D., Li, S., Dai, Y.: Probabilistic visual cryptography scheme with reversing. J. Tsinghua Univ. (Sci. & Tech.) 1, 121–123 (2008)

    Google Scholar 

  6. Li, L., El-Latif, A.A.A., Shi, Z., Niu, X.: A new loss-tolerant image encryption scheme based on secret sharing and two chaotic systems. Research Journal of Applied Sciences Engineering and Technology 4, 877–883 (2012)

    Google Scholar 

  7. Yang, B., Busch, C., Niu, X.: Perceptual image encryption via reversible histogram spreading. In: Proceedings of 6th International Symposium on Image and Signal Processing and Analysis, ISPA 2009, pp. 471–476. IEEE (2009)

    Google Scholar 

  8. Torrubia, A., Mora, F.: Perceptual cryptography on mpeg layer iii bit-streams. IEEE Trans. Consumer Electronics 48(4), 1046–1050 (2002)

    Article  Google Scholar 

  9. Li, S., Chen, G., Cheung, A., Bhargava, B., Lo, K.T.: On the design of perceptual mpeg-video encryption algorithms. IEEE Trans. Circuits Syst. Video Tech. 17(2), 214–223 (2007)

    Article  Google Scholar 

  10. Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  11. Weir, J., Yan, W.: A comprehensive study of visual cryptography. In: Shi, Y.Q. (ed.) Transactions on DHMS V. LNCS, vol. 6010, pp. 70–105. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  12. Wu, X., Sun, W.: Image sharing scheme based on error diffusion. J. Comput. Appl. 31(1), 74–81 (2011)

    Google Scholar 

  13. Li, L., Yan, X., Wang, N., El-Latif, A.A.A., Niu, X.: Meaningful image sharing threshold scheme based on error diffusion. Int. J. Digit. Content Technol. Appl. (JDCTA) 6(13), 275–284 (2012)

    Article  Google Scholar 

  14. Ateniese, G., Blundo, C., Santis, A.D., Stinson, D.R.: Extended capabilities for visual cryptography. Theor. Comput. Sci. 250(1), 143–161 (2001)

    Article  MATH  Google Scholar 

  15. Kafri, O., Keren, E.: Encryption of pictures and shapes by random grids. Optics Letters 12(6), 377–379 (1987)

    Article  Google Scholar 

  16. Shyu, S.J.: Image encryption by random grids. Pattern Recognition 40(3), 1014–1031 (2007)

    Article  MATH  Google Scholar 

  17. Thien, C.C., Lin, J.C.: An image-sharing method with user-friendly shadow images. IEEE Trans. Circuits Syst. Video Technol. 13(12), 1161–1169 (2003)

    Article  Google Scholar 

  18. Zhao, R., Zhao, J.J., Dai, F., Zhao, F.Q.: A new image secret sharing scheme to identify cheaters. Comput. Stand. Interfaces 31(1), 252–257 (2009)

    Article  Google Scholar 

  19. Jin, D., Yan, W.Q., Kankanhalli, M.S.: Progressive color visual cryptography. Journal of Electronic Imaging 14(3), 033019–033019 (2005)

    Google Scholar 

  20. Hou, Y.C., Quan, Z.Y., Tsai, C.F., Tseng, A.Y.: Block-based progressive visual secret sharing. Information Sciences (2013)

    Google Scholar 

  21. Hou, Y.C., Quan, Z.Y.: Progressive visual cryptography with unexpanded shares. IEEE Trans. on Circ. and Sys. for Video Tech. 21(11), 1760–1764 (2011)

    Article  Google Scholar 

  22. Fang, W.P., Lin, J.C.: Progressive viewing and sharing of sensitive images. Pattern Recognition and Image Analysis 16(4), 632–636 (2006)

    Article  Google Scholar 

  23. Chen, S.K.: Friendly progressive visual secret sharing using generalized random grids. Optical Engineering 48(11), 117001–117001 (2009)

    Article  Google Scholar 

  24. Chen, S.K., Lin, J.C.: Fault-tolerant and progressive transmission of images. Pattern Recognition 38(12), 2466–2471 (2005)

    Article  Google Scholar 

  25. Huang, C.P., Hsieh, C.H., Huang, P.S.: Progressive sharing for a secret image. J. Syst. Softw. 83(3), 517–527 (2010)

    Article  Google Scholar 

  26. Yan, X., Wang, S., El-Latif, A.A.A., Sang, J., Niu, X.: Threshold visual secret sharing based on boolean operations (2013) (to be appear)

    Google Scholar 

  27. Wu, X., Sun, W.: Random grid-based visual secret sharing with abilities of or and xor decryptions. J. Vis. Commun. Image R (2012)

    Google Scholar 

  28. Nist/sematech e-handbook of statistical methods, http://www.itl.nist.gov/div898/handbook/eda/section3/eda3652.htm

  29. Wu, X., Sun, W.: Improving the visual quality of random grid-based visual secret sharing. Signal Processing (2012)

    Google Scholar 

  30. Yan, X., Wang, S., Li, L., El-Latif, A.A.A., Wei, Z., Niu, X.: A new assessment measure of shadow image quality based on error diffusion techniques. J. Inf. Hiding Multimedia Signal Process (JIHMSP) 4(2), 118–126 (2013)

    Google Scholar 

  31. Yang, C.N.: New visual secret sharing schemes using probabilistic method. Pattern Recognit. Lett. 25(4), 481–494 (2004)

    Article  Google Scholar 

  32. Chen, T.H., Tsao, K.H.: User-friendly random-grid-based visual secret sharing. IEEE Trans. on Circ. and Sys. for Video Tech. 21(11), 1693–1703 (2011)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Yan, X., Wang, S., El-Latif, A.A.A., Sang, J., Niu, X. (2014). A Novel Perceptual Secret Sharing Scheme. In: Shi, Y.Q., Liu, F., Yan, W. (eds) Transactions on Data Hiding and Multimedia Security IX. Lecture Notes in Computer Science, vol 8363. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-55046-1_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-55046-1_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-55045-4

  • Online ISBN: 978-3-642-55046-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics