Secret image sharing with separate shadow authentication ability
Secret image sharing (SIS) is attracting increasing attention due to its wide application to the distributed storage of digital images in a cloud and the importance of digital images. Shadow authentication plays an important role in the practical application of SIS. However, most SIS schemes with sh...
Gespeichert in:
Veröffentlicht in: | Signal processing. Image communication 2020-03, Vol.82, p.115721, Article 115721 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | 115721 |
container_title | Signal processing. Image communication |
container_volume | 82 |
creator | Yan, Xuehu Gong, Qinghong Li, Longlong Yang, Guozheng Lu, Yuliang Liu, Jingju |
description | Secret image sharing (SIS) is attracting increasing attention due to its wide application to the distributed storage of digital images in a cloud and the importance of digital images. Shadow authentication plays an important role in the practical application of SIS. However, most SIS schemes with shadow authentication ability embed each shadow into a cover image using an existing information hiding technique, which leads to high generation and recovery (authentication) complexity and pixel expansion. In this paper, we propose an SIS scheme for a (k,n) threshold with a separate shadow authentication ability based on SIS itself rather than information hiding through applying visual secret sharing (VSS) to polynomial-based SIS by using a screening operation. The proposed scheme has low generation and recovery (authentication) complexity and no pixel expansion with a separate shadow authentication ability. In addition, it achieves lossless recovery without auxiliary encryption. We validate the proposed scheme by means of illustrations, theoretical analyses and comparisons.
•SIS with a separate shadow authentication ability is proposed.•The secret image is losslessly recovered without auxiliary encryption.•It has low recovery (authentication) complexity and no pixel expansion. |
doi_str_mv | 10.1016/j.image.2019.115721 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2369325298</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0923596519306940</els_id><sourcerecordid>2369325298</sourcerecordid><originalsourceid>FETCH-LOGICAL-c331t-f9b7f4102be9e379da81489036a84361f29f39555fe9ef16971d76198aafffc63</originalsourceid><addsrcrecordid>eNp9kM1OwzAQhC0EEqXwBFwicU7w2okdH5BAFX9SJQ7A2XKddeuoJMV2qfr2pA1nTivNzrerGUKugRZAQdy2hf8ySywYBVUAVJLBCZlALVXOhJSnZEIV43mlRHVOLmJsKaWspGpC7t_RBkzZkc_iygTfLbOdT6ss4sYEk45q0-8ys00r7JK3Jvm-y8zCr33aX5IzZ9YRr_7mlHw-PX7MXvL52_Pr7GGeW84h5U4tpCuBsgUq5FI1poayVpQLU5dcgGPKcVVVlRv2DoSS0EgBqjbGOWcFn5Kb8e4m9N9bjEm3_TZ0w0vNuFCcVUzVg4uPLhv6GAM6vQlDtLDXQPWhKt3qY1R9qEqPVQ3U3UjhEODHY9DReuwsNj6gTbrp_b_8LzWPcmU</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2369325298</pqid></control><display><type>article</type><title>Secret image sharing with separate shadow authentication ability</title><source>Elsevier ScienceDirect Journals</source><creator>Yan, Xuehu ; Gong, Qinghong ; Li, Longlong ; Yang, Guozheng ; Lu, Yuliang ; Liu, Jingju</creator><creatorcontrib>Yan, Xuehu ; Gong, Qinghong ; Li, Longlong ; Yang, Guozheng ; Lu, Yuliang ; Liu, Jingju</creatorcontrib><description>Secret image sharing (SIS) is attracting increasing attention due to its wide application to the distributed storage of digital images in a cloud and the importance of digital images. Shadow authentication plays an important role in the practical application of SIS. However, most SIS schemes with shadow authentication ability embed each shadow into a cover image using an existing information hiding technique, which leads to high generation and recovery (authentication) complexity and pixel expansion. In this paper, we propose an SIS scheme for a (k,n) threshold with a separate shadow authentication ability based on SIS itself rather than information hiding through applying visual secret sharing (VSS) to polynomial-based SIS by using a screening operation. The proposed scheme has low generation and recovery (authentication) complexity and no pixel expansion with a separate shadow authentication ability. In addition, it achieves lossless recovery without auxiliary encryption. We validate the proposed scheme by means of illustrations, theoretical analyses and comparisons.
•SIS with a separate shadow authentication ability is proposed.•The secret image is losslessly recovered without auxiliary encryption.•It has low recovery (authentication) complexity and no pixel expansion.</description><identifier>ISSN: 0923-5965</identifier><identifier>EISSN: 1879-2677</identifier><identifier>DOI: 10.1016/j.image.2019.115721</identifier><language>eng</language><publisher>Amsterdam: Elsevier B.V</publisher><subject>Complexity ; Digital imaging ; Encryption ; Lossless recovery ; Pixel expansion ; Pixels ; Polynomials ; Recovery ; Secret image sharing ; Shadow authentication ; Shadows</subject><ispartof>Signal processing. Image communication, 2020-03, Vol.82, p.115721, Article 115721</ispartof><rights>2019 Elsevier B.V.</rights><rights>Copyright Elsevier BV Mar 2020</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c331t-f9b7f4102be9e379da81489036a84361f29f39555fe9ef16971d76198aafffc63</citedby><cites>FETCH-LOGICAL-c331t-f9b7f4102be9e379da81489036a84361f29f39555fe9ef16971d76198aafffc63</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.sciencedirect.com/science/article/pii/S0923596519306940$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>314,776,780,3536,27903,27904,65309</link.rule.ids></links><search><creatorcontrib>Yan, Xuehu</creatorcontrib><creatorcontrib>Gong, Qinghong</creatorcontrib><creatorcontrib>Li, Longlong</creatorcontrib><creatorcontrib>Yang, Guozheng</creatorcontrib><creatorcontrib>Lu, Yuliang</creatorcontrib><creatorcontrib>Liu, Jingju</creatorcontrib><title>Secret image sharing with separate shadow authentication ability</title><title>Signal processing. Image communication</title><description>Secret image sharing (SIS) is attracting increasing attention due to its wide application to the distributed storage of digital images in a cloud and the importance of digital images. Shadow authentication plays an important role in the practical application of SIS. However, most SIS schemes with shadow authentication ability embed each shadow into a cover image using an existing information hiding technique, which leads to high generation and recovery (authentication) complexity and pixel expansion. In this paper, we propose an SIS scheme for a (k,n) threshold with a separate shadow authentication ability based on SIS itself rather than information hiding through applying visual secret sharing (VSS) to polynomial-based SIS by using a screening operation. The proposed scheme has low generation and recovery (authentication) complexity and no pixel expansion with a separate shadow authentication ability. In addition, it achieves lossless recovery without auxiliary encryption. We validate the proposed scheme by means of illustrations, theoretical analyses and comparisons.
•SIS with a separate shadow authentication ability is proposed.•The secret image is losslessly recovered without auxiliary encryption.•It has low recovery (authentication) complexity and no pixel expansion.</description><subject>Complexity</subject><subject>Digital imaging</subject><subject>Encryption</subject><subject>Lossless recovery</subject><subject>Pixel expansion</subject><subject>Pixels</subject><subject>Polynomials</subject><subject>Recovery</subject><subject>Secret image sharing</subject><subject>Shadow authentication</subject><subject>Shadows</subject><issn>0923-5965</issn><issn>1879-2677</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><recordid>eNp9kM1OwzAQhC0EEqXwBFwicU7w2okdH5BAFX9SJQ7A2XKddeuoJMV2qfr2pA1nTivNzrerGUKugRZAQdy2hf8ySywYBVUAVJLBCZlALVXOhJSnZEIV43mlRHVOLmJsKaWspGpC7t_RBkzZkc_iygTfLbOdT6ss4sYEk45q0-8ys00r7JK3Jvm-y8zCr33aX5IzZ9YRr_7mlHw-PX7MXvL52_Pr7GGeW84h5U4tpCuBsgUq5FI1poayVpQLU5dcgGPKcVVVlRv2DoSS0EgBqjbGOWcFn5Kb8e4m9N9bjEm3_TZ0w0vNuFCcVUzVg4uPLhv6GAM6vQlDtLDXQPWhKt3qY1R9qEqPVQ3U3UjhEODHY9DReuwsNj6gTbrp_b_8LzWPcmU</recordid><startdate>202003</startdate><enddate>202003</enddate><creator>Yan, Xuehu</creator><creator>Gong, Qinghong</creator><creator>Li, Longlong</creator><creator>Yang, Guozheng</creator><creator>Lu, Yuliang</creator><creator>Liu, Jingju</creator><general>Elsevier B.V</general><general>Elsevier BV</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>202003</creationdate><title>Secret image sharing with separate shadow authentication ability</title><author>Yan, Xuehu ; Gong, Qinghong ; Li, Longlong ; Yang, Guozheng ; Lu, Yuliang ; Liu, Jingju</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c331t-f9b7f4102be9e379da81489036a84361f29f39555fe9ef16971d76198aafffc63</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Complexity</topic><topic>Digital imaging</topic><topic>Encryption</topic><topic>Lossless recovery</topic><topic>Pixel expansion</topic><topic>Pixels</topic><topic>Polynomials</topic><topic>Recovery</topic><topic>Secret image sharing</topic><topic>Shadow authentication</topic><topic>Shadows</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Yan, Xuehu</creatorcontrib><creatorcontrib>Gong, Qinghong</creatorcontrib><creatorcontrib>Li, Longlong</creatorcontrib><creatorcontrib>Yang, Guozheng</creatorcontrib><creatorcontrib>Lu, Yuliang</creatorcontrib><creatorcontrib>Liu, Jingju</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Signal processing. Image communication</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Yan, Xuehu</au><au>Gong, Qinghong</au><au>Li, Longlong</au><au>Yang, Guozheng</au><au>Lu, Yuliang</au><au>Liu, Jingju</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Secret image sharing with separate shadow authentication ability</atitle><jtitle>Signal processing. Image communication</jtitle><date>2020-03</date><risdate>2020</risdate><volume>82</volume><spage>115721</spage><pages>115721-</pages><artnum>115721</artnum><issn>0923-5965</issn><eissn>1879-2677</eissn><abstract>Secret image sharing (SIS) is attracting increasing attention due to its wide application to the distributed storage of digital images in a cloud and the importance of digital images. Shadow authentication plays an important role in the practical application of SIS. However, most SIS schemes with shadow authentication ability embed each shadow into a cover image using an existing information hiding technique, which leads to high generation and recovery (authentication) complexity and pixel expansion. In this paper, we propose an SIS scheme for a (k,n) threshold with a separate shadow authentication ability based on SIS itself rather than information hiding through applying visual secret sharing (VSS) to polynomial-based SIS by using a screening operation. The proposed scheme has low generation and recovery (authentication) complexity and no pixel expansion with a separate shadow authentication ability. In addition, it achieves lossless recovery without auxiliary encryption. We validate the proposed scheme by means of illustrations, theoretical analyses and comparisons.
•SIS with a separate shadow authentication ability is proposed.•The secret image is losslessly recovered without auxiliary encryption.•It has low recovery (authentication) complexity and no pixel expansion.</abstract><cop>Amsterdam</cop><pub>Elsevier B.V</pub><doi>10.1016/j.image.2019.115721</doi></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0923-5965 |
ispartof | Signal processing. Image communication, 2020-03, Vol.82, p.115721, Article 115721 |
issn | 0923-5965 1879-2677 |
language | eng |
recordid | cdi_proquest_journals_2369325298 |
source | Elsevier ScienceDirect Journals |
subjects | Complexity Digital imaging Encryption Lossless recovery Pixel expansion Pixels Polynomials Recovery Secret image sharing Shadow authentication Shadows |
title | Secret image sharing with separate shadow authentication ability |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-26T14%3A49%3A46IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Secret%20image%20sharing%20with%20separate%20shadow%20authentication%20ability&rft.jtitle=Signal%20processing.%20Image%20communication&rft.au=Yan,%20Xuehu&rft.date=2020-03&rft.volume=82&rft.spage=115721&rft.pages=115721-&rft.artnum=115721&rft.issn=0923-5965&rft.eissn=1879-2677&rft_id=info:doi/10.1016/j.image.2019.115721&rft_dat=%3Cproquest_cross%3E2369325298%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2369325298&rft_id=info:pmid/&rft_els_id=S0923596519306940&rfr_iscdi=true |