Secret image sharing with separate shadow authentication ability

Secret image sharing (SIS) is attracting increasing attention due to its wide application to the distributed storage of digital images in a cloud and the importance of digital images. Shadow authentication plays an important role in the practical application of SIS. However, most SIS schemes with sh...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Signal processing. Image communication 2020-03, Vol.82, p.115721, Article 115721
Hauptverfasser: Yan, Xuehu, Gong, Qinghong, Li, Longlong, Yang, Guozheng, Lu, Yuliang, Liu, Jingju
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page 115721
container_title Signal processing. Image communication
container_volume 82
creator Yan, Xuehu
Gong, Qinghong
Li, Longlong
Yang, Guozheng
Lu, Yuliang
Liu, Jingju
description Secret image sharing (SIS) is attracting increasing attention due to its wide application to the distributed storage of digital images in a cloud and the importance of digital images. Shadow authentication plays an important role in the practical application of SIS. However, most SIS schemes with shadow authentication ability embed each shadow into a cover image using an existing information hiding technique, which leads to high generation and recovery (authentication) complexity and pixel expansion. In this paper, we propose an SIS scheme for a (k,n) threshold with a separate shadow authentication ability based on SIS itself rather than information hiding through applying visual secret sharing (VSS) to polynomial-based SIS by using a screening operation. The proposed scheme has low generation and recovery (authentication) complexity and no pixel expansion with a separate shadow authentication ability. In addition, it achieves lossless recovery without auxiliary encryption. We validate the proposed scheme by means of illustrations, theoretical analyses and comparisons. •SIS with a separate shadow authentication ability is proposed.•The secret image is losslessly recovered without auxiliary encryption.•It has low recovery (authentication) complexity and no pixel expansion.
doi_str_mv 10.1016/j.image.2019.115721
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2369325298</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0923596519306940</els_id><sourcerecordid>2369325298</sourcerecordid><originalsourceid>FETCH-LOGICAL-c331t-f9b7f4102be9e379da81489036a84361f29f39555fe9ef16971d76198aafffc63</originalsourceid><addsrcrecordid>eNp9kM1OwzAQhC0EEqXwBFwicU7w2okdH5BAFX9SJQ7A2XKddeuoJMV2qfr2pA1nTivNzrerGUKugRZAQdy2hf8ySywYBVUAVJLBCZlALVXOhJSnZEIV43mlRHVOLmJsKaWspGpC7t_RBkzZkc_iygTfLbOdT6ss4sYEk45q0-8ys00r7JK3Jvm-y8zCr33aX5IzZ9YRr_7mlHw-PX7MXvL52_Pr7GGeW84h5U4tpCuBsgUq5FI1poayVpQLU5dcgGPKcVVVlRv2DoSS0EgBqjbGOWcFn5Kb8e4m9N9bjEm3_TZ0w0vNuFCcVUzVg4uPLhv6GAM6vQlDtLDXQPWhKt3qY1R9qEqPVQ3U3UjhEODHY9DReuwsNj6gTbrp_b_8LzWPcmU</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2369325298</pqid></control><display><type>article</type><title>Secret image sharing with separate shadow authentication ability</title><source>Elsevier ScienceDirect Journals</source><creator>Yan, Xuehu ; Gong, Qinghong ; Li, Longlong ; Yang, Guozheng ; Lu, Yuliang ; Liu, Jingju</creator><creatorcontrib>Yan, Xuehu ; Gong, Qinghong ; Li, Longlong ; Yang, Guozheng ; Lu, Yuliang ; Liu, Jingju</creatorcontrib><description>Secret image sharing (SIS) is attracting increasing attention due to its wide application to the distributed storage of digital images in a cloud and the importance of digital images. Shadow authentication plays an important role in the practical application of SIS. However, most SIS schemes with shadow authentication ability embed each shadow into a cover image using an existing information hiding technique, which leads to high generation and recovery (authentication) complexity and pixel expansion. In this paper, we propose an SIS scheme for a (k,n) threshold with a separate shadow authentication ability based on SIS itself rather than information hiding through applying visual secret sharing (VSS) to polynomial-based SIS by using a screening operation. The proposed scheme has low generation and recovery (authentication) complexity and no pixel expansion with a separate shadow authentication ability. In addition, it achieves lossless recovery without auxiliary encryption. We validate the proposed scheme by means of illustrations, theoretical analyses and comparisons. •SIS with a separate shadow authentication ability is proposed.•The secret image is losslessly recovered without auxiliary encryption.•It has low recovery (authentication) complexity and no pixel expansion.</description><identifier>ISSN: 0923-5965</identifier><identifier>EISSN: 1879-2677</identifier><identifier>DOI: 10.1016/j.image.2019.115721</identifier><language>eng</language><publisher>Amsterdam: Elsevier B.V</publisher><subject>Complexity ; Digital imaging ; Encryption ; Lossless recovery ; Pixel expansion ; Pixels ; Polynomials ; Recovery ; Secret image sharing ; Shadow authentication ; Shadows</subject><ispartof>Signal processing. Image communication, 2020-03, Vol.82, p.115721, Article 115721</ispartof><rights>2019 Elsevier B.V.</rights><rights>Copyright Elsevier BV Mar 2020</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c331t-f9b7f4102be9e379da81489036a84361f29f39555fe9ef16971d76198aafffc63</citedby><cites>FETCH-LOGICAL-c331t-f9b7f4102be9e379da81489036a84361f29f39555fe9ef16971d76198aafffc63</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.sciencedirect.com/science/article/pii/S0923596519306940$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>314,776,780,3536,27903,27904,65309</link.rule.ids></links><search><creatorcontrib>Yan, Xuehu</creatorcontrib><creatorcontrib>Gong, Qinghong</creatorcontrib><creatorcontrib>Li, Longlong</creatorcontrib><creatorcontrib>Yang, Guozheng</creatorcontrib><creatorcontrib>Lu, Yuliang</creatorcontrib><creatorcontrib>Liu, Jingju</creatorcontrib><title>Secret image sharing with separate shadow authentication ability</title><title>Signal processing. Image communication</title><description>Secret image sharing (SIS) is attracting increasing attention due to its wide application to the distributed storage of digital images in a cloud and the importance of digital images. Shadow authentication plays an important role in the practical application of SIS. However, most SIS schemes with shadow authentication ability embed each shadow into a cover image using an existing information hiding technique, which leads to high generation and recovery (authentication) complexity and pixel expansion. In this paper, we propose an SIS scheme for a (k,n) threshold with a separate shadow authentication ability based on SIS itself rather than information hiding through applying visual secret sharing (VSS) to polynomial-based SIS by using a screening operation. The proposed scheme has low generation and recovery (authentication) complexity and no pixel expansion with a separate shadow authentication ability. In addition, it achieves lossless recovery without auxiliary encryption. We validate the proposed scheme by means of illustrations, theoretical analyses and comparisons. •SIS with a separate shadow authentication ability is proposed.•The secret image is losslessly recovered without auxiliary encryption.•It has low recovery (authentication) complexity and no pixel expansion.</description><subject>Complexity</subject><subject>Digital imaging</subject><subject>Encryption</subject><subject>Lossless recovery</subject><subject>Pixel expansion</subject><subject>Pixels</subject><subject>Polynomials</subject><subject>Recovery</subject><subject>Secret image sharing</subject><subject>Shadow authentication</subject><subject>Shadows</subject><issn>0923-5965</issn><issn>1879-2677</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><recordid>eNp9kM1OwzAQhC0EEqXwBFwicU7w2okdH5BAFX9SJQ7A2XKddeuoJMV2qfr2pA1nTivNzrerGUKugRZAQdy2hf8ySywYBVUAVJLBCZlALVXOhJSnZEIV43mlRHVOLmJsKaWspGpC7t_RBkzZkc_iygTfLbOdT6ss4sYEk45q0-8ys00r7JK3Jvm-y8zCr33aX5IzZ9YRr_7mlHw-PX7MXvL52_Pr7GGeW84h5U4tpCuBsgUq5FI1poayVpQLU5dcgGPKcVVVlRv2DoSS0EgBqjbGOWcFn5Kb8e4m9N9bjEm3_TZ0w0vNuFCcVUzVg4uPLhv6GAM6vQlDtLDXQPWhKt3qY1R9qEqPVQ3U3UjhEODHY9DReuwsNj6gTbrp_b_8LzWPcmU</recordid><startdate>202003</startdate><enddate>202003</enddate><creator>Yan, Xuehu</creator><creator>Gong, Qinghong</creator><creator>Li, Longlong</creator><creator>Yang, Guozheng</creator><creator>Lu, Yuliang</creator><creator>Liu, Jingju</creator><general>Elsevier B.V</general><general>Elsevier BV</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>202003</creationdate><title>Secret image sharing with separate shadow authentication ability</title><author>Yan, Xuehu ; Gong, Qinghong ; Li, Longlong ; Yang, Guozheng ; Lu, Yuliang ; Liu, Jingju</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c331t-f9b7f4102be9e379da81489036a84361f29f39555fe9ef16971d76198aafffc63</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Complexity</topic><topic>Digital imaging</topic><topic>Encryption</topic><topic>Lossless recovery</topic><topic>Pixel expansion</topic><topic>Pixels</topic><topic>Polynomials</topic><topic>Recovery</topic><topic>Secret image sharing</topic><topic>Shadow authentication</topic><topic>Shadows</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Yan, Xuehu</creatorcontrib><creatorcontrib>Gong, Qinghong</creatorcontrib><creatorcontrib>Li, Longlong</creatorcontrib><creatorcontrib>Yang, Guozheng</creatorcontrib><creatorcontrib>Lu, Yuliang</creatorcontrib><creatorcontrib>Liu, Jingju</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Signal processing. Image communication</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Yan, Xuehu</au><au>Gong, Qinghong</au><au>Li, Longlong</au><au>Yang, Guozheng</au><au>Lu, Yuliang</au><au>Liu, Jingju</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Secret image sharing with separate shadow authentication ability</atitle><jtitle>Signal processing. Image communication</jtitle><date>2020-03</date><risdate>2020</risdate><volume>82</volume><spage>115721</spage><pages>115721-</pages><artnum>115721</artnum><issn>0923-5965</issn><eissn>1879-2677</eissn><abstract>Secret image sharing (SIS) is attracting increasing attention due to its wide application to the distributed storage of digital images in a cloud and the importance of digital images. Shadow authentication plays an important role in the practical application of SIS. However, most SIS schemes with shadow authentication ability embed each shadow into a cover image using an existing information hiding technique, which leads to high generation and recovery (authentication) complexity and pixel expansion. In this paper, we propose an SIS scheme for a (k,n) threshold with a separate shadow authentication ability based on SIS itself rather than information hiding through applying visual secret sharing (VSS) to polynomial-based SIS by using a screening operation. The proposed scheme has low generation and recovery (authentication) complexity and no pixel expansion with a separate shadow authentication ability. In addition, it achieves lossless recovery without auxiliary encryption. We validate the proposed scheme by means of illustrations, theoretical analyses and comparisons. •SIS with a separate shadow authentication ability is proposed.•The secret image is losslessly recovered without auxiliary encryption.•It has low recovery (authentication) complexity and no pixel expansion.</abstract><cop>Amsterdam</cop><pub>Elsevier B.V</pub><doi>10.1016/j.image.2019.115721</doi></addata></record>
fulltext fulltext
identifier ISSN: 0923-5965
ispartof Signal processing. Image communication, 2020-03, Vol.82, p.115721, Article 115721
issn 0923-5965
1879-2677
language eng
recordid cdi_proquest_journals_2369325298
source Elsevier ScienceDirect Journals
subjects Complexity
Digital imaging
Encryption
Lossless recovery
Pixel expansion
Pixels
Polynomials
Recovery
Secret image sharing
Shadow authentication
Shadows
title Secret image sharing with separate shadow authentication ability
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-26T14%3A49%3A46IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Secret%20image%20sharing%20with%20separate%20shadow%20authentication%20ability&rft.jtitle=Signal%20processing.%20Image%20communication&rft.au=Yan,%20Xuehu&rft.date=2020-03&rft.volume=82&rft.spage=115721&rft.pages=115721-&rft.artnum=115721&rft.issn=0923-5965&rft.eissn=1879-2677&rft_id=info:doi/10.1016/j.image.2019.115721&rft_dat=%3Cproquest_cross%3E2369325298%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2369325298&rft_id=info:pmid/&rft_els_id=S0923596519306940&rfr_iscdi=true