As a basic method, Shamir’s polynomial-based secret sharing (PSS) is utilized to achieve polynomial-based secret image sharing schemes (PSISSs) with other better performances, such as meaningful shares, two-in-one property and et al. Since the modulus of the sharing polynomial must be a prime, e.g., 251 for PSISSs, Shamir’s PSS cannot deal with pixel values more than 250 well. On account of the importance of precise recovery in the image encryption field, there exist several solutions to achieve precise recovery for PSISSs, which have natural drawbacks, such as large computational costs, random shape changes and extra division for sharing. In this paper, we utilize a simple filtering operation to achieve the proposed lossless PSISS, namely LPSISS, without any side effects. We choose 257 rather than 251 as the sharing modulus, and filter sets of shared values to abandon sets with pixel value more than 255. This solution to lossless recovery is simple but effective, which is valuable as a basic technique to achieve better performances. Experimental results are conducted to prove the effectiveness of the proposed scheme.
This is a preview of subscription content, log in to check access.
This work is supported by the National Natural Science Foundation of China (Grant Number: 61602491).
Attasena, V., Darmont, J., Harbi, N.: Secret sharing for cloud data security: a survey. VLDB J. 2, 1–25 (2017)Google Scholar
Ding, W., Liu, K., Yan, X., Liu, L.: Polynomial-based secret image sharing scheme with fully lossless recovery. Int. J. Digital Crime Forensics 10, 120–136 (2018)CrossRefGoogle Scholar
Dingledine, R., Freedman, M.J., Molnar, D.: The free haven project: distributed anonymous storage service. In: International Workshop on Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability, pp. 67–95 (2001)Google Scholar
Guo, C., Chang, C.C., Qin, C.: A hierarchical threshold secret image sharing. Pattern Recogn. Lett. 33(1), 83–91 (2012)CrossRefGoogle Scholar
Hadavi, M.A., Jalili, R., Damiani, E., Cimato, S.: Security and searchability in secret sharing-based data outsourcing. Int. J. Inf. Secur. 14(6), 1–17 (2015)CrossRefGoogle Scholar
He, J., Lan, W., Tang, S.: A secure image sharing scheme with high quality stego-images based on steganography. Multimedia Tools Appl. 76(6), 7677–7698 (2017)CrossRefGoogle Scholar
Jin, D., Yan, W.Q., Kankanhalli, M.S.: Progressive color visual cryptography. J. Electron. Imaging 14(3), 033019 (2005)CrossRefGoogle Scholar
Li, P., Ma, P.J., Su, X.H., Yang, C.N.: Improvements of a two-in-one image secret sharing scheme based on gray mixing model. J. Vis. Commun. Image Represent. 23(3), 441–453 (2012)CrossRefGoogle Scholar
Li, P., Yang, C.N., Kong, Q., Ma, Y., Liu, Z.: Sharing more information in gray visual cryptography scheme. J. Vis. Commun. Image Represent. 24(8), 1380–1393 (2013)CrossRefGoogle Scholar
Li, P., Yang, C.N., Wu, C.C., Kong, Q., Ma, Y.: Essential secret image sharing scheme with different importance of shadows. J. Vis. Commun. Image Represent. 24(7), 1106–1114 (2013)CrossRefGoogle Scholar
Ulutas, G., Nabiyev, V.V., Ulutas, M.: Polynomial approach in a secret image sharing using quadratic residue. In: International Symposium on Computer and Information Sciences, pp. 586–591 (2009)Google Scholar
Yang, C.N., Chen, T.S., Yu, K.H., Wang, C.C.: Improvements of image sharing with steganography and authentication. J. Syst. Softw. 80(7), 1070–1076 (2007)CrossRefGoogle Scholar