Multimedia Tools and Applications

, Volume 75, Issue 21, pp 13913–13929 | Cite as

Secret image sharing with smaller shadow sizes for general access structures

  • Ying-Ru Chen
  • Ling-Hwei Chen
  • Shyong Jian Shyu


In the area of secret image sharing (SIS), most papers focused on the schemes for threshold or some special access structures. Regarding general access structures (GAS), few results have been found in the literature. Two SIS schemes for GAS were proposed in 2001 and 2010, both are based on qualified sets. However, one distorts the reconstructed secret image, and some extra information is needed in both schemes. Here, we propose three polynomial based SIS schemes for GAS. Considering either qualified or forbidden sets, these schemes can reconstruct the secret image perfectly without any extra information needed. Some proof and analysis on the shadow sizes of the three schemes are given to lead us to choose the one with the smallest size. In addition, we also give some comparisons with two existing schemes, and security issue is also addressed in conclusion.


Shadow size Secret image sharing General access structure 



This work was supported in part by the National Science Council project under Grant NSC 103-2221-E-009-121-MY2.


  1. 1.
    Ateniese G, Blundo C, De Santis A, Stinson DR (1996) Visual cryptography for general access structures. Inf Comput 129(2):86–106MathSciNetCrossRefMATHGoogle Scholar
  2. 2.
    Benaloh J, Leichter J (1988) Generalized secret sharing and monotone functions. In: Advances in Cryptology-CRYPTO’88, LNCS 1988, vol 403, pp 27–36Google Scholar
  3. 3.
    Blakley GR (1979) Safeguarding cryptographic keys. In: Proceedings AFIPS 1979 National Computer Conference, 48, New York, USA, 4-7 June, pp 313–317Google Scholar
  4. 4.
    Chang CC, Huynh NT, Le HD (2014) Lossless and unlimited multi-image sharing based on Chinese remainder theorem and Lagrange interpolation. Signal Process 99:159–170CrossRefGoogle Scholar
  5. 5.
    Guo C, Chang CC (2013) A construction for secret sharing scheme with general access structure. J Inf Hiding Multimed Signal Process 4(1):1–8MathSciNetGoogle Scholar
  6. 6.
    Horng G (2001) A new method for constructing multiple assignment schemes for generalized secret sharing. J Inf Sci Eng 17:959–65MathSciNetGoogle Scholar
  7. 7.
    Ito M, Saito A, Nishizeki T (1987) Secret sharing schemes realizing general access structure. In: Proc. IEEE Global Telecommunication Conf. (Globecom 87), pp 99–102Google Scholar
  8. 8.
    Iwamoto M, Yamamoto H, Ogawa H (2007) Optimal multiple assignments based on integer programming in secret sharing schemes with general access structures. IEICE Trans Fundam 90-A(1):101–112CrossRefGoogle Scholar
  9. 9.
    Lin YT, Juan JST, Wang YC (2010) A secure and efficient multi-use multi-secret images sharing scheme for general access structure. Proc. of 8th IEEE International Conference on Industrial Informatics (INDIN2010), Osaka University, Osaka, Japan, July 13-16, pp 437–442Google Scholar
  10. 10.
    Linde Y, Buzo A, Gray RM (1980) An algorithm for Vector Quantization design. IEEE Trans Commun 28:84–95CrossRefGoogle Scholar
  11. 11.
    Shamir A (1979) How to share a secret. Communication of the ACM 22(11):612–613MathSciNetCrossRefMATHGoogle Scholar
  12. 12.
    Thien CC, Lin JC (2002) Secret image sharing. Comput Graph 26:765–70CrossRefGoogle Scholar
  13. 13.
    Tochikubo K (2008) Efficient secret sharing schemes based on unauthorized subsets. IEICE Trans Fundam Electron Commun Comput Sci 2008 E91-A(10):2860–2867CrossRefGoogle Scholar
  14. 14.
    Tsai CS, Chang CC (2001) A generalized secret image sharing and recovery scheme, Advanced in Multimedia Information Processing. Lect Notes Comput Sci 2195:963–968CrossRefMATHGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2015

Authors and Affiliations

  • Ying-Ru Chen
    • 1
  • Ling-Hwei Chen
    • 2
  • Shyong Jian Shyu
    • 3
  1. 1.Institute of Computer Science and EngineeringNational Chiao Tung UniversityHsinchuChina
  2. 2.Department of Computer ScienceNational Chiao Tung UniversityHsinchuChina
  3. 3.Department of Computer Science and Information EngineeringMing Chuan UniversityTaoyuanChina

Personalised recommendations