Abstract
In this paper, a novel perceptual secret sharing model namely PSS model is defined. Then, a general (1, k out of n) PSS scheme is proposed based on maximum likelihood estimation (MLE). The proposed model has a large number of valuable features that previous secret sharing schemes fail to have. Furthermore, the proposed PSS scheme satisfies P (l, k, n) threshold mechanism which means that no perceptual information of the secret data will be revealed when the number of shadows is less than l, the degraded perceptual quality will be recovered when the number of shadows is greater than or equal to l and less than k, the more shadows the better recovered perceptual quality will be. Lossless perceptual quality will be recovered when the number of shadows is greater than or equal to k and less than or equal to n that could control access for different owners. This property will be useful for prominent prevalence in real applications like pay-per-view videos, Pay- TV/Music and art-work image vending, video on demand (VOD), etc.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Chen, T.H., Tsao, K.H.: Threshold visual secret sharing by random grids. J. Syst. Softw. 84(7), 1197–1208 (2011)
Zhou, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography. IEEE Trans. Image Process. 15(8), 2441–2453 (2006)
Wang, D., Zhang, L., Ma, N., Li, X.: Two secret sharing schemes based on boolean operations. Pattern Recognit. 40(10), 2776–2785 (2007)
Wang, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography via error diffusion. IEEE Trans. Inf. Forensics Security 4(3), 383–396 (2009)
Yi, F., Wang, D., Li, S., Dai, Y.: Probabilistic visual cryptography scheme with reversing. J. Tsinghua Univ. (Sci. & Tech.) 1, 121–123 (2008)
Li, L., El-Latif, A.A.A., Shi, Z., Niu, X.: A new loss-tolerant image encryption scheme based on secret sharing and two chaotic systems. Research Journal of Applied Sciences Engineering and Technology 4, 877–883 (2012)
Yang, B., Busch, C., Niu, X.: Perceptual image encryption via reversible histogram spreading. In: Proceedings of 6th International Symposium on Image and Signal Processing and Analysis, ISPA 2009, pp. 471–476. IEEE (2009)
Torrubia, A., Mora, F.: Perceptual cryptography on mpeg layer iii bit-streams. IEEE Trans. Consumer Electronics 48(4), 1046–1050 (2002)
Li, S., Chen, G., Cheung, A., Bhargava, B., Lo, K.T.: On the design of perceptual mpeg-video encryption algorithms. IEEE Trans. Circuits Syst. Video Tech. 17(2), 214–223 (2007)
Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)
Weir, J., Yan, W.: A comprehensive study of visual cryptography. In: Shi, Y.Q. (ed.) Transactions on DHMS V. LNCS, vol. 6010, pp. 70–105. Springer, Heidelberg (2010)
Wu, X., Sun, W.: Image sharing scheme based on error diffusion. J. Comput. Appl. 31(1), 74–81 (2011)
Li, L., Yan, X., Wang, N., El-Latif, A.A.A., Niu, X.: Meaningful image sharing threshold scheme based on error diffusion. Int. J. Digit. Content Technol. Appl. (JDCTA) 6(13), 275–284 (2012)
Ateniese, G., Blundo, C., Santis, A.D., Stinson, D.R.: Extended capabilities for visual cryptography. Theor. Comput. Sci. 250(1), 143–161 (2001)
Kafri, O., Keren, E.: Encryption of pictures and shapes by random grids. Optics Letters 12(6), 377–379 (1987)
Shyu, S.J.: Image encryption by random grids. Pattern Recognition 40(3), 1014–1031 (2007)
Thien, C.C., Lin, J.C.: An image-sharing method with user-friendly shadow images. IEEE Trans. Circuits Syst. Video Technol. 13(12), 1161–1169 (2003)
Zhao, R., Zhao, J.J., Dai, F., Zhao, F.Q.: A new image secret sharing scheme to identify cheaters. Comput. Stand. Interfaces 31(1), 252–257 (2009)
Jin, D., Yan, W.Q., Kankanhalli, M.S.: Progressive color visual cryptography. Journal of Electronic Imaging 14(3), 033019–033019 (2005)
Hou, Y.C., Quan, Z.Y., Tsai, C.F., Tseng, A.Y.: Block-based progressive visual secret sharing. Information Sciences (2013)
Hou, Y.C., Quan, Z.Y.: Progressive visual cryptography with unexpanded shares. IEEE Trans. on Circ. and Sys. for Video Tech. 21(11), 1760–1764 (2011)
Fang, W.P., Lin, J.C.: Progressive viewing and sharing of sensitive images. Pattern Recognition and Image Analysis 16(4), 632–636 (2006)
Chen, S.K.: Friendly progressive visual secret sharing using generalized random grids. Optical Engineering 48(11), 117001–117001 (2009)
Chen, S.K., Lin, J.C.: Fault-tolerant and progressive transmission of images. Pattern Recognition 38(12), 2466–2471 (2005)
Huang, C.P., Hsieh, C.H., Huang, P.S.: Progressive sharing for a secret image. J. Syst. Softw. 83(3), 517–527 (2010)
Yan, X., Wang, S., El-Latif, A.A.A., Sang, J., Niu, X.: Threshold visual secret sharing based on boolean operations (2013) (to be appear)
Wu, X., Sun, W.: Random grid-based visual secret sharing with abilities of or and xor decryptions. J. Vis. Commun. Image R (2012)
Nist/sematech e-handbook of statistical methods, http://www.itl.nist.gov/div898/handbook/eda/section3/eda3652.htm
Wu, X., Sun, W.: Improving the visual quality of random grid-based visual secret sharing. Signal Processing (2012)
Yan, X., Wang, S., Li, L., El-Latif, A.A.A., Wei, Z., Niu, X.: A new assessment measure of shadow image quality based on error diffusion techniques. J. Inf. Hiding Multimedia Signal Process (JIHMSP) 4(2), 118–126 (2013)
Yang, C.N.: New visual secret sharing schemes using probabilistic method. Pattern Recognit. Lett. 25(4), 481–494 (2004)
Chen, T.H., Tsao, K.H.: User-friendly random-grid-based visual secret sharing. IEEE Trans. on Circ. and Sys. for Video Tech. 21(11), 1693–1703 (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Yan, X., Wang, S., El-Latif, A.A.A., Sang, J., Niu, X. (2014). A Novel Perceptual Secret Sharing Scheme. In: Shi, Y.Q., Liu, F., Yan, W. (eds) Transactions on Data Hiding and Multimedia Security IX. Lecture Notes in Computer Science, vol 8363. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-55046-1_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-55046-1_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-55045-4
Online ISBN: 978-3-642-55046-1
eBook Packages: Computer ScienceComputer Science (R0)