Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Quality improved (k, n) priority based progressive visual secret sharing

Published: 01 May 2020 Publication History

Abstract

Progressive Visual Secret Sharing (PVSS) is a Visual Secret Sharing scheme which shares a secret image among multiple users and during the decryption this secret image can be reconstructed in a progressive manner. Recently, PVSS has been extended for priority users by giving different importance to different shares. Thus, the higher priority user holding higher importance shares obtains better visual quality compared to the lower priority users. However, existing priority based visual secret sharing suffers from the problem of inconsistent contrast and degraded visual quality. Hence, this paper uses two different approaches namely Codebook approach and Random grid approach to construct (k, n) Priority based Progressive Visual Secret Sharing (PPVSS) without pixel expansion to provide consistent contrast and better visual quality of reconstructed image. Experimental results show the effectiveness of proposed scheme compared to the existing scheme.

References

[1]
Bhattacharjee T, Rout RK, Maity SP (2017) Affine Boolean classification in secret image sharing for progressive quality access control. J Inf Secur Appl. 10.1016/j.jisa.2017.01.001
[2]
Chao HC and Fan T-Y XOR-based progressive visual secret sharing using generalized random grids J Displays 2017 49 6-15
[3]
Chao H-C and Fan T-Y Random-grid based progressive visual secret sharing scheme with adaptive priority J Digital Signal Process 2017 68 69-80
[4]
Chao H-C and Fan T-Y Priority visual secret sharing of random grids for threshold access structures J Multimedia Tools Appl 2018 77 10 11867-11882
[5]
Ching-NungYang PL, Wu C-C, and Cai S-R Reducing shadow size in essential secret image sharing by conjunctive hierarchical approach J Signal Process Image Commun 2015 31 1-9
[6]
Chiu P-L and Lee K-H Efficient constructions for progressive visual cryptography with meaningful shares J Signal Process 2019 165 233-249
[7]
Hou Y-C and Quan Z-Y Progressive visual cryptography with unexpanded shares IEEE Trans Circuit Syst Video Technol 2011 21 11 1760-1764
[8]
Hou Y-C, Quan Z-Y, and Tsai C-F A privilege-based visual secret sharing model J Vis Commun Image Represent 2015 33 358-367
[9]
Huh J-H PLC-based design of monitoring system for ICT-integrated vertical fish farm Hum Cent Comput Inf Sci 2017 7 20
[10]
Ibtihal M, Driss EO, and Hassan N Homomorphic encryption as a service for outsourced images in mobile cloud computing environment Int J Cloud Appl Comput 2017 7 2 27-40
[11]
Jung S-H, Huh J-H (2019) A novel on transmission line tower big aata analysis model using altered K-means and ADQL. J Sustain. 10.3390/su11133499
[12]
LeCun Y, Bengio Y, and Hinton G Deep learning J Nat 2015 521 7553 436-444
[13]
Lee J-S, Chang C-C, Huynh N-T, and Tsai H-YPreserving user-friendly shadow and high-contrast quality for multiple visual secret sharing techniqueJ Digital Signal Process201540131-1393326524
[14]
Li Z, Zhao M, Jiang H, Xu Q (2019) Keyword guessing on multi-user searchable encryption. Int J High Perform Comput Netw 14(1). 10.1504/IJHPCN.2019.099744
[15]
Lin K-S, Lin C-H, and Chen T-HDistortionless visual multi-secret sharing based on random gridJ Sci2014288330-3461355.94081
[16]
Lin C-H, Lee Y-S, and Chen T-H Friendly progressive random-grid-based visual secret sharing with adaptive contrast J Vis Commun Image Represent 2015 33 31-41
[17]
Liu Y-N and Wu Z An improved threshold multi-level image recovery scheme J Inf Secur Appl 2018 40 166-172
[18]
Liu X, Shen W, Yan X, and Zhang W Random grid-based threshold visual secret sharing with improved visual quality and lossless recovery ability J Multimedia Tools Appl 2018 77 16 20673-20696
[19]
Mhala NC and Pais AR Contrast enhancement of Progressive Visual Secret Sharing (PVSS) scheme for gray-scale and color images using super-resolution J Signal Process 2019 162 253-267
[20]
Naor M, Shamir A (1994) Visual cryptography. In: De Santis A (ed) Advances in cryptology proceedings of Eurocypto 94, lecture notes in computer science, vol 950, pp 1–12
[21]
Schmidhuber J Deep learning in neural networks: an overview J Neural Netw 2015 61 85-117
[22]
Seo Y-S, Huh J-H (2019) Automatic emotion-based music classification for supporting intelligent IoT applications. J Electron. 10.3390/electronics8020164
[23]
Shivani S and Agarwal S Novel basis matrix creation and preprocessingalgorithms for friendly progressive visual secret sharing with space-efficient shares J Multimedia Tools Appl 2017 76 6 8711-8744
[24]
Shyu SJ Image encryption by multiple random grids J Pattern Recognit 2009 42 1582-1596
[25]
Wu X and Sun W Improving the visual quality of random grid-based visual secret sharing J Signal Process 2013 93 977-995
[26]
Yan X, Shen W, and Niu X Threshold construction from specific cases in visual cryptography without the pixel expansion J Signal Process 2014 105 389-398
[27]
Yan X, Liu X, Yang C-N (2015) An enhanced threshold visual secret sharing based on random grids. J Real-Time Image Proc. 10.1007/s11554-015-0540-4
[28]
Yan X, Wang S, Abd El-Latif AA, and Niu X Random grids-based visual secret sharing with improved visual quality via error diffusion J Multimedia Tools Appl 2015 74 21 9279-9296
[29]
Yan X, Shen W, and Niu X Threshold progressive visual cryptography construction with unexpanded shares J Multimedia Tools Appl 2016 75 14 8657-8674
[30]
Yang C-N and Chu Y-Y A general (k, n) scalable secret image sharing scheme with the smooth scalability J Syst Softw 2011 84 1726-1733
[31]
Yang C-N and Lin C-YAlmost-aspect-ratio-invariant visual cryptography without adding extra subpixelsJ Inf Sci2015312131-1513336134
[32]
Yang C-N and Yang Y-YNew extended visual cryptography schemes with clearer shadow imagesJ Inf Sci20142714246-2633191847
[33]
Yang C-N, Liao J-K, and Wang D-S New privilege-based visual cryptography with arbitrary privilege levels J Vis Commun Image Represent 2017 42 121-131
[34]
Zkik K, Orhanou G, and El Hajji S Secure mobile multi cloud architecture for authentication and data storage Int J Cloud Appl Comput 2017 7 2 62-76

Cited By

View all
  • (2024)Software and hardware realizations for different designs of chaos-based secret image sharing systemsJournal of Real-Time Image Processing10.1007/s11554-024-01450-821:3Online publication date: 6-May-2024
  • (2023)Pixel-based Visual Secret Sharing Using Lorenz SystemProceedings of the 2023 8th International Conference on Cloud Computing and Internet of Things10.1145/3627345.3627351(38-45)Online publication date: 22-Sep-2023
  • (2022)Novel Visual Secret Sharing Scheme for the QR Code with Meaningful SharesSecurity and Communication Networks10.1155/2022/49272392022Online publication date: 1-Jan-2022

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Multimedia Tools and Applications
Multimedia Tools and Applications  Volume 79, Issue 17-18
May 2020
1446 pages

Publisher

Kluwer Academic Publishers

United States

Publication History

Published: 01 May 2020
Accepted: 01 October 2019
Revision received: 14 August 2019
Received: 04 December 2018

Author Tags

  1. Progressive visual secret sharing
  2. Priority
  3. Threshold
  4. Codebook
  5. Random grids

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 02 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Software and hardware realizations for different designs of chaos-based secret image sharing systemsJournal of Real-Time Image Processing10.1007/s11554-024-01450-821:3Online publication date: 6-May-2024
  • (2023)Pixel-based Visual Secret Sharing Using Lorenz SystemProceedings of the 2023 8th International Conference on Cloud Computing and Internet of Things10.1145/3627345.3627351(38-45)Online publication date: 22-Sep-2023
  • (2022)Novel Visual Secret Sharing Scheme for the QR Code with Meaningful SharesSecurity and Communication Networks10.1155/2022/49272392022Online publication date: 1-Jan-2022

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media