International Journal of Intelligent Information Technology Application 1:1 (2008) 1-9
Available at http://www.engineering-press.org/IJIITA.htm
1999-2459/ Copyright © 2008 Engineering Technology Press,Hong Kong
July,2008
A Probabilistic Visual Secret Sharing Scheme for
Grayscale Images with Voting Strategy
Chin-Chen Chang
Department of Information Engineering and Computer Science, Feng Chia University, Taichung 407, Taiwan, R.O.C.
Department of Computer Science and Information Engineering, National Chung Cheng University, Chiayi 621, Taiwan,
R.O.C.
E-mail: ccc@cs.ccu.edu.tw
*Chia-Chen Lin
Department of Computer Science and Information Management, Providence University, Taichung 433, Taiwan, R.O.C.
E-mail: mhlin3@pu.edu.tw
T.Hoang Ngan Le, Hoai Bac Le
Department of Computer Science, Natural Science University, 227 Nguyen Van Cu, District 5, HCMC, Vietnam.
E-mail: {lhbac, lthngan}@fit.hcmuns.edu.vn
Abstract—Wang et al. proposed two visual secret sharing
schemes based on Boolean operations in 2007. One is a
probabilistic (2, n) secret sharing scheme, which is called (2,
n) ProbVSS scheme, for binary images and the other is a
deterministic (n, n) secret sharing scheme for grayscale
images. Although Wang et al. only apply probabilistic
concept to design the revealing phase of their (2, n)
ProbVSS scheme, their (2, n) ProbVSS and (n, n) VSS
schemes solve the problems of computational complexity
and pixel expansion at the same time.
In Wang et al.’s (n, n) VSS scheme for grayscale images, n
generated shadows must be collected in advance to
completely reconstruct a secret grayscale image. If Wang et
al.’s (2, n) ProbVSS scheme is repeated eight times to deal
with grayscale images, the image quality of the
reconstructed image is significantly decreased when only
any two of n shadows are used to generate the reconstructed
grayscale image. To provide a (2, n) ProbVSS scheme that
demonstrates better image quality of the reconstructed
grayscale image than Wang et al.’s scheme without
significantly increasing computational complexity, we apply
the voting strategy and the least significant bits abandoning
approach in combination with Wang et al.’s (2, n) ProbVSS
for binary images to handle grayscale images. Experimental
results confirm that the image quality of the reconstructed
grayscale image achieved with the proposed scheme is better
than one achieved by the pure Wang et al.’s scheme.
Index Terms—Probabilistic visual secret sharing, voting
strategy, (2, n) ProbVSS scheme, grayscale images
I. INTRODUCTION
In 1971, a secret sharing scheme also called a (k, n)
threshold scheme was firstly introduced by George
Blakley [1] and Adi Shamir [2], respectively. The first
objective of secret sharing scheme is to protect secret data
by dividing it into n pieces; each piece is called a share or
a shadow. Later, the set of shadows is distributed to n
participants and each participant holds a single piece of
the set of shadows. The secret data can be reconstructed if
and only if there is complete knowledge of the k shadows,
and k-1 or fewer shadows will reveal no information
about the secret data, where n k ≤ . Based on the (k, n)
threshold scheme, in 1995 Noar and Shamir firstly
introduced a secret image sharing scheme, which is also
called visual secret sharing (VSS), that focused on image
data [3]. Based on Noar and Shamir’s idea, several
schemes for grayscale images [4, 7] and for color images
[6, 8, 9] have been proposed. In essence, instead of the
original image the VSS scheme uses several random-like
images called shadows to be the data transmitted over the
Internet. The shadows can thwart malicious attackers and
prevent the secret image from being directly accessed.
The secret image sharing schemes also inherit the
properties of the (k, n) threshold scheme mentioned above.
Generally, four criteria are used to evaluate the
performance of a (k, n) VSS scheme. The first criterion is
security: whether the scheme guarantees that fewer k
shadows offer no information about the secret image,
where n k ≤ . The second criterion is accuracy: the
similarity between the reconstructed image and the
original one. Basically, accuracy is respect to the image
quality of the reconstructed image. A higher quality in the
reconstructed image implies higher accuracy of the VSS
scheme. The third criterion is computational complexity:
the number of operators required to generate shadows for
a secret image and to reconstruct the reconstructed image
by using the collected shadows. The last criterion is the
size of a shadow called the pixel expansion problem.
Larger shadow size implies higher transmission cost and
storage cost.