Computer Science ›› 2019, Vol. 46 ›› Issue (4): 123-128.doi: 10.11896/j.issn.1002-137X.2019.04.020

• Information Security • Previous Articles     Next Articles

Digital Image Sharing Algorithm Based on Triangular Partition

YUAN Xi-xi, CAI Zhan-chuan   

  1. Faculty of Information Technology,Macau University of Science and Technology,Macao 999078,China
  • Received:2018-06-21 Online:2019-04-15 Published:2019-04-23

Abstract: The digital image is easily lost,damaged,and stolen by cheaters and used for illegal transmission because of the insecure network.Therefore,the digital image encryption technology can effectively enhance the security of image.The digital image sharing algorithm is an important encryption technology.However,the conventional image sharing technologiesrepeat encryption pixel by pixel without considering the gray distribution characteristic,resulting in both reduced security and unnecessary space-time overhead.To handle the above problems,a new digital image sharing algorithm was proposed by adopting the gray distribution characteristic based non-uniform triangular partition algorithm and the threshold scheme.First,the non-uniform triangular partition algorithm is used to obtain the mesh of the image according to the gray distribution characteristic.Second,the threshold scheme is used to encrypt and share the vertex pixels of each sub-triangle in the mesh.Finally,the original image is reconstructed by using the Lagrange interpolation polynomial and the mesh coding information.The experimental results show that the proposed method reduces the redundant encryption of pixels,improves the security and has good image reconstruction effect,so it is an effective image sharing algorithm.

Key words: Image sharing, Threshold scheme, Triangular partition

CLC Number: 

  • TP391.41
[1]OUYANG X B,SHAO L P.A (K,N) Significant Nonexpansive Image Sharing Scheme Based on GF (23)[J].Computer Science,2015,42(12):251-256.(in Chinese) 欧阳显斌,邵利平.一种基于 GF (23) 的(K,N)有意义无扩张图像分存方案[J].计算机科学,2015,42(12):251-256.
[2]HU C Q,DENG S J,QIN M F,et al.Digital image encryption algorithm based on Logistic and standard mapping[J].Computer Science,2010,37(12):57-59.(in Chinese) 胡春强,邓绍江,秦明甫,等.基于 Logistic 与标准映射的数字图像加密算法[J].计算机科学,2010,37(12):57-59.
[3]SUN W,ZHOU J,ZHU S,et al.Robust Privacy-Preserving Ima- ge Sharing over Online Social Networks (OSNs)[J].ACM Transactions on Multimedia Computing,Communications,and Applications (TOMM),2018,14(1):14.
[4]ROZANTSEV A,SALZMANN M,FUA P.Beyond sharing weights for deep domain adaptation[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2019,41(4):801-814.
[5]SASAKI M,WATANABE Y.Visual Secret Sharing Schemes Encrypting Multiple Images[J].IEEE Transactions on Information Forensics and Security,2018,13(2):356-365.
[6]HU C Q.Research and Implementation of Image Secret Sharing Algorithm[D].Chongqing:Chongqing University,2009.(in Chinese) 胡春强.图像分存算法的研究与实现[D].重庆:重庆大学,2009.
[7]YI F,WANG D S,DAI Y Q.Multi-secure color image visual sharing scheme for general access structure[J].Progress inNa-tural Science,2006,16(1):95-100.(in Chinese) 易枫,王道顺,戴一奇.一般存取结构的多密图彩色可视分存方案[J].自然科学进展,2006,16(1):95-100.
[8]YI F,WANG D S,LUO P,et al.Two new color image (n,n) sharing schemes[J].Journal of Communications,2007,28(5):30-35.(in Chinese) 易枫,王道顺,罗平,等.两种新的彩色图像 (n,n) 分存方案[J].通信学报,2007,28(5):30-35.
[9]DENG S J,HU C Q,WANG F X,et al.Digital Image Sharing Algorithm Based on Quadratic Remainder Theorem[J].Computer Engineering,2009,35(15):124-125.(in Chinese) 邓绍江,胡春强,王方晓,等.基于二次剩余定理的数字图像分存算法[J].计算机工程,2009,35(15):124-125.
[10]SHAMIR A.How to share a secret[J].Communications of the ACM,1979,22(11):612-613.
[11]BLAKLEY G R,KABATIANSKII G A.Linear algebra ap- proach to secret sharing schemes[M]∥Error Control,Crypto-logy,and Speech Compression.Springer,Berlin,Heidelberg,1994:33-40.
[12]LIU S,WANG D S.(k,n) Visual Extension of True Color Extension[J].Journal of Wuhan University(Natural Science Edition),2008,54(5):603-606.(in Chinese) 刘硕,王道顺.(k,n) 真彩色扩展可视分存技术[J].武汉大学学报 (理学版),2008,54(5):603-606.
[13]NAOR M,SHAMIR A.Visual cryptography[C]∥Workshop on the Theory and Application of of Cryptographic Techniques.Springer,Berlin,Heidelberg,1994:1-12.
[14]WANG D S,ZHANG L,MA N,et al.Two secret sharing schemes based on Boolean operations[J].Pattern Recognition,2007,40(10):2776-2785.
[15]LEE K H,CHIU P L.Sharing visual secrets in single image random dot stereograms[J].IEEE Transactions on image proces-sing,2014,23(10):4336-4347.
[16]DANG W,HE M,WANG D,et al.K out of K Extended Visual Cryptography Scheme Based on “XOR”[J].International Journal of Computer and Communication Engineering,2015,4(6):439.
[17]KATZ J,MENEZES A J,VANOORSCHOT P C,et al.Hand- book of applied cryptography[M].CRC Press,1996:64-69.
[18]DHAMIJA R,PERRIG A.Deja Vu-A User Study:Using Images for Authentication[C]∥USENIX Security Symposium.2000:4.
[19]THIEN C C,LIN J C.Secret image sharing.Computers & Graphics,2002,26(5):765-770.
[20]SINGH P,RAMAN B.Reversible data hiding based on Shamir’s secret sharing for color images over cloud[J].Information Sciences,2018,422:77-97.
[21]YAN X,LIU X,YANG C N.An enhanced threshold visual secret sharing based on random grids[J].Journal of Real-time Ima-ge Processing,2018,14(1):61-73.
[22]HUA W,LIAO X.A secret image sharing scheme based on piecewise linear chaotic map and Chinese remainder theorem[J].Multimedia Tools and Applications,2017,76(5):7087-7103.
[23]BAO L,YI S,ZHOU Y.Combination of Sharing Matrix and Ima- ge Encryption for Lossless (k,n)-Secret Image Sharing[J].IEEE Transactions on Image Processing,2017,26(12):5618-5631.
[24]MATSUMOTO R.Quantum stabilizer codes can realize access structures impossible by classical secret sharing[J].IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences,2017,100(12):2738-2739.
[25]齐东旭,宋瑞霞,李坚.非连续正交函数[M].北京:科学出版社,2011:280-281.
[26]YU J D,SONG R X,QI D X.A scheme for steganography based on triangular partition of digital images [J].Journal of Compu-ter Research and Development,2009,46(9):1432-1437.(in Chinese) 余建德,宋瑞霞,齐东旭.基于数字图像三角形剖分的信息伪装算法[J].计算机研究与发展,2009,46(9):1432-1437.
[27]U K T,JI N,QI D X,et al.A novel image denoising algorithm based on non-uniform triangular partition and interpolation[C]∥2010 International Conference on Future Power and Energy Engineering (ICFPEE).IEEE,2010:67-70.
[28]CAI Z,LAN T.Method for coding data:U.S.Patent 9,755,661[P].2017-09-05.
[29]SHARMA V K,SRIVASTAVA D K,MATHUR P.Efficient image steganography using graph signal processing[J].IET Image Processing,2018,12(6):1065-1071.
[30]MUHAMMAD K,HAMZA R,AHMAD J,et al.Secure Surveillance Framework for IoT systems using Probabilistic Image Encryption[J].IEEE Transactions on Industrial Informatics,2018,14(8):3679-3689.
[31]TOMPA M,WOLL H.How to share a secret with cheaters[M]∥ Advances in Cryptology-CRYPTO’ 86.Springer Berlin Heidelberg,1987:261-265.
[1] OUYANG Xian-bin and SHAO Li-ping. Meaningful (K,N) Free Expansion Image Sharing Scheme Based on GF(23) [J]. Computer Science, 2015, 42(12): 251-256.
[2] . Secret Gray-level Image Sharing Scheme Based on Recovery Function and Error Diffusion [J]. Computer Science, 2013, 40(2): 112-116.
[3] ZHANG Yu-chen,WANG Ya-di,HAN Ji-hong,FAN Yu-dan. Distributed Key Management for Ad-hoc Network Based on CPK [J]. Computer Science, 2011, 38(10): 75-77.
[4] BU Shan-yue,WANG Ru-chuan. Verifiable and Efficient Multi-secret Sharing Threshold Scheme [J]. Computer Science, 2011, 38(1): 100-103.
[5] BA0 Yang,LU Zheng-ding,HUANG Bao-hua,LI Rui-xuan,HU He-ping,LU Song-feng. Dynamic Multi-secret Sharing Scheme for P2P Environment [J]. Computer Science, 2010, 37(9): 40-43.
[6] LIU Yi,HAO Yan-jun,PANG Liao-jun. Verifiable Secret Sharing Scheme Based on ElGamal Cryptosystem [J]. Computer Science, 2010, 37(8): 80-82.
[7] CHEN Yang-kui,YU Jia,HAO Rong,LIU Hong-yan,XU Yue-bin. Publicly Verifiable Secret Sharing Scheme with Proactive Ability [J]. Computer Science, 2010, 37(6): 125-127.
[8] YAN De-qin ZHAO Hong-bo JIN Hong (Department of Computer Seienee,Liaoning Normal University,Dalian 116029,China). [J]. Computer Science, 2009, 36(6): 75-77.
[9] . [J]. Computer Science, 2006, 33(8): 126-127.
[10] WU Kai-Gui  ,LIU Dong ,FENG Yong (College of Computer, Chongqing University, Chongqing 400044). [J]. Computer Science, 2006, 33(3): 97-98.
[11] PANG LiaoJun, WANG Yu-Min (National Key Lab. of Integrated Service Networks, Xidian Univ, , Xi'an 710071). [J]. Computer Science, 2006, 33(1): 66-68.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!