{"title":"基于多项式k-一致性的鲁棒秘密图像共享方案","authors":"Lizhi Xiong;Rui Ding;Ching-Nung Yang;Zhangjie Fu","doi":"10.1109/TCSVT.2025.3554842","DOIUrl":null,"url":null,"abstract":"The (<italic>k</i>, <italic>n</i>)-threshold Secret Image Sharing (SIS) is a naturally fault-tolerant technique for image privacy protection. A secret image is processed through secret sharing to generate <italic>n</i> shadow images, which are then distributed to <italic>n</i> different recipients. During the recovery phase, the complete secret image can be reconstructed by any <italic>k</i> out of <italic>n</i> shadow images. Although (<italic>k</i>, <italic>n</i>)-threshold SIS itself allows for the loss of up to <inline-formula> <tex-math>$n-k$ </tex-math></inline-formula> shadow images, if there are pixel errors in the remaining <italic>k</i> shadow images, the recovery of the secret image will be declared a failure. Therefore, Robust Secret Image Sharing (RSIS) has been proposed to address the issue. However, the current proposed RSIS schemes only demonstrated limited robustness against noise attacks. This paper presents a novel <italic>k</i>-consistency-based RSIS scheme to resist malicious attacks, including noise, JPEG compression, tampering, and cropping. In the sharing phase, a dual-SIS mechanism is first designed to perform two rounds of secret sharing on the secret image. In the recovery phase, high-quality secret image can be reconstructed based on <italic>k</i>-consistency after attacking. The experimental results demonstrated that our scheme not only provides comprehensive robustness but also allows for flexible adjustment of shadow images’ sizes, ensuring both security and efficiency during image sharing.","PeriodicalId":13082,"journal":{"name":"IEEE Transactions on Circuits and Systems for Video Technology","volume":"35 9","pages":"8880-8892"},"PeriodicalIF":11.1000,"publicationDate":"2025-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Robust Secret Image Sharing Scheme Based on Polynomial k-Consistency\",\"authors\":\"Lizhi Xiong;Rui Ding;Ching-Nung Yang;Zhangjie Fu\",\"doi\":\"10.1109/TCSVT.2025.3554842\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The (<italic>k</i>, <italic>n</i>)-threshold Secret Image Sharing (SIS) is a naturally fault-tolerant technique for image privacy protection. A secret image is processed through secret sharing to generate <italic>n</i> shadow images, which are then distributed to <italic>n</i> different recipients. During the recovery phase, the complete secret image can be reconstructed by any <italic>k</i> out of <italic>n</i> shadow images. Although (<italic>k</i>, <italic>n</i>)-threshold SIS itself allows for the loss of up to <inline-formula> <tex-math>$n-k$ </tex-math></inline-formula> shadow images, if there are pixel errors in the remaining <italic>k</i> shadow images, the recovery of the secret image will be declared a failure. Therefore, Robust Secret Image Sharing (RSIS) has been proposed to address the issue. However, the current proposed RSIS schemes only demonstrated limited robustness against noise attacks. This paper presents a novel <italic>k</i>-consistency-based RSIS scheme to resist malicious attacks, including noise, JPEG compression, tampering, and cropping. In the sharing phase, a dual-SIS mechanism is first designed to perform two rounds of secret sharing on the secret image. In the recovery phase, high-quality secret image can be reconstructed based on <italic>k</i>-consistency after attacking. The experimental results demonstrated that our scheme not only provides comprehensive robustness but also allows for flexible adjustment of shadow images’ sizes, ensuring both security and efficiency during image sharing.\",\"PeriodicalId\":13082,\"journal\":{\"name\":\"IEEE Transactions on Circuits and Systems for Video Technology\",\"volume\":\"35 9\",\"pages\":\"8880-8892\"},\"PeriodicalIF\":11.1000,\"publicationDate\":\"2025-03-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Circuits and Systems for Video Technology\",\"FirstCategoryId\":\"5\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10942401/\",\"RegionNum\":1,\"RegionCategory\":\"工程技术\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"ENGINEERING, ELECTRICAL & ELECTRONIC\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Circuits and Systems for Video Technology","FirstCategoryId":"5","ListUrlMain":"https://ieeexplore.ieee.org/document/10942401/","RegionNum":1,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
Robust Secret Image Sharing Scheme Based on Polynomial k-Consistency
The (k, n)-threshold Secret Image Sharing (SIS) is a naturally fault-tolerant technique for image privacy protection. A secret image is processed through secret sharing to generate n shadow images, which are then distributed to n different recipients. During the recovery phase, the complete secret image can be reconstructed by any k out of n shadow images. Although (k, n)-threshold SIS itself allows for the loss of up to $n-k$ shadow images, if there are pixel errors in the remaining k shadow images, the recovery of the secret image will be declared a failure. Therefore, Robust Secret Image Sharing (RSIS) has been proposed to address the issue. However, the current proposed RSIS schemes only demonstrated limited robustness against noise attacks. This paper presents a novel k-consistency-based RSIS scheme to resist malicious attacks, including noise, JPEG compression, tampering, and cropping. In the sharing phase, a dual-SIS mechanism is first designed to perform two rounds of secret sharing on the secret image. In the recovery phase, high-quality secret image can be reconstructed based on k-consistency after attacking. The experimental results demonstrated that our scheme not only provides comprehensive robustness but also allows for flexible adjustment of shadow images’ sizes, ensuring both security and efficiency during image sharing.
期刊介绍:
The IEEE Transactions on Circuits and Systems for Video Technology (TCSVT) is dedicated to covering all aspects of video technologies from a circuits and systems perspective. We encourage submissions of general, theoretical, and application-oriented papers related to image and video acquisition, representation, presentation, and display. Additionally, we welcome contributions in areas such as processing, filtering, and transforms; analysis and synthesis; learning and understanding; compression, transmission, communication, and networking; as well as storage, retrieval, indexing, and search. Furthermore, papers focusing on hardware and software design and implementation are highly valued. Join us in advancing the field of video technology through innovative research and insights.