Abstract
In a (t, s, k, n)-essential secret image sharing ESIS scheme, a secret image is shared into two kinds of shadows including s essential shadows and (n − s) non-essential shadows. When receiving at least k shadows containing at least t essential shadows, the secret image can be lossless revealed. In this paper, a preview-versioned style essential secret image sharing is proposed. When receiving at least t essential shadows, a previewed version of secret image can be revealed. It is reasonable that at least t essential shadows are entitled to see the rough version of secret image, when the total shadows are less than k.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Naor, M., Shamir, A.: Visual cryptography. In: Advances in Cryptology, Eurocrypt’94, pp. 1–12 (1995)
Kafri, O., Keren, E.: Encryption of pictures and shapes by random grids. Opt. Lett. 12, 377–379 (1987)
Shyu, S.J.: Image encryption by random grids. Pattern Recognit. 40(3), 1014–1031 (2007)
Shyu, S.J.: Image encryption by multiple random grids. Pattern Recognit. 42(7), 1582–1596 (2009)
Chen, T.H., Tsao, K.H.: Visual secret sharing by random grids revisited. Pattern Recognit. 42, 2203–2217 (2009)
Chen, S.K.: Friendly progressive visual secret sharing using generalized random grids. Opt. Eng. 48(11), 117001.1–117001.7 (2009)
Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual cryptography for general access structures. Inf. Comput. 129, 86–106 (1996)
Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Extended capabilities for visual cryptography. Theor. Comput. Sci. 250, 143–161 (2001)
Hou, Y.C.: Visual cryptography for color images. Pattern Recognit. 36, 1619–1629 (2003)
Fang, W.P., Lin, J.C.: Visual cryptography with extra ability of hiding confidential data. J. Electron. Imaging 15, 023020–023026 (2006)
Hofmeister, T., Krause, M., Simon, H.U.: Contrast-optimal k out of n secret sharing schemes in visual cryptography. Theor. Comput. Sci. 240(2), 471–485 (2000)
Thien, C.C., Lin, J.C.: Secret image sharing. Comput. Graph. 26, 765–770 (2002)
Chen, S.K., Lin, J.C.: Fault-tolerant and progressive transmission of images. Pattern Recognit. 38(12), 2466–2471 (2005)
Wang, R.Z., Shyu, S.J.: Scalable secret image sharing. Signal Process.: Image Commun. 22, 363–373 (2007)
Yang, C.N., Huang, S.M.: Constructions and properties of k out of n scalable secret image sharing. Opt. Commun. 283, 1750–1762 (2010)
Wu, C.C., Kao, S.J., Hwang, M.S.: A high quality image sharing with steganography and adaptive authentication scheme. J. Syst. Softw. 84, 2196–2207 (2011)
Wang, R.Z., Su, C.H.: Secret image sharing with smaller shadow images. Pattern Recognit. Lett. 27(6), 551–555 (2006)
Chang, C.C., Hsieh, Y.P., Lin, C.H.: Sharing secrets in stego images with authentication. Pattern Recognit. 41, 3130–3137 (2008)
Yang, C.N., Chu, Y.Y.: A general (k, n) scalable secret image sharing scheme with the smooth scalability. J. Syst. Softw. 84, 1726–1733 (2011)
Li, P., Yang, C.N., Wu, C.C., Kong, Q., Ma, Y.: Essential secret image sharing scheme with different importance of shadows. J. Vis. Commun. Image Represent. 24, 1106–1114 (2013)
Yang, C.N., Li, P., Wu, C.C., Cai, S.R.: Reducing shadow size in essential secret image sharing by conjunctive hierarchical approach. Signal Process.: Image Commun. 31, 1–9 (2015)
Chen, S.K.: Essential secret image sharing with increasable shadows. Opt. Eng. 55(1), 013103 (2016)
Stalling, W.: Cryptography and network security: principles and practices. Pearson Education Inc., pp. 126–134 (2003)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Chen, SK., Cheng, RH. (2019). Preview-Versioned Essential Secret Image Sharing. In: Pan, JS., Ito, A., Tsai, PW., Jain, L. (eds) Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing. IIH-MSP 2018. Smart Innovation, Systems and Technologies, vol 110. Springer, Cham. https://doi.org/10.1007/978-3-030-03748-2_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-03748-2_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-03747-5
Online ISBN: 978-3-030-03748-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)