Research article

Meaningful secret image sharing for JPEG images with arbitrary quality factors


  • JPEG is the most common format for storing and transmitting photographic images on social network platforms. JPEG image is widely used in people's life because of their low storage space and high visual quality. Secret image sharing (SIS) technology is important to protect image data. Traditional SIS schemes generally focus on spatial images, however there is little research on frequency domain images. In addition, the current tiny research on SIS for JPEG images only focuses on JPEG images with a compression quality factor (QF) of 100. To overcome the limitation of JPEG images in SIS, we propose a meaningful SIS for JPEG images to operate the quantized DCT coefficients of JPEG images. The random elements utilization model is applied to achieve meaningful shadow images. Our proposed scheme has a better quality of the shadow images and the recovered secret image. Experiment results and comparisons indicate the effectiveness of the scheme. The scheme can be used for JPEG images with any compression QF. Besides, the scheme has good characteristics, such as (k,n) threshold, extended shadow images.

    Citation: Yue Jiang, Xuehu Yan, Jia Chen, Jingwen Cheng, Jianguo Zhang. Meaningful secret image sharing for JPEG images with arbitrary quality factors[J]. Mathematical Biosciences and Engineering, 2022, 19(11): 11544-11562. doi: 10.3934/mbe.2022538

    Related Papers:

    [1] Yanjun Liu, Chin-Chen Chang, Peng-Cheng Huang . Security protection using two different image shadows with authentication. Mathematical Biosciences and Engineering, 2019, 16(4): 1914-1932. doi: 10.3934/mbe.2019093
    [2] Xuehu Yan, Xuan Zhou, Yuliang Lu, Jingju Liu, Guozheng Yang . Image inpainting-based behavior image secret sharing. Mathematical Biosciences and Engineering, 2020, 17(4): 2950-2966. doi: 10.3934/mbe.2020166
    [3] Qi Wang, John Blesswin A, T Manoranjitham, P Akilandeswari, Selva Mary G, Shubhangi Suryawanshi, Catherine Esther Karunya A . Securing image-based document transmission in logistics and supply chain management through cheating-resistant visual cryptographic protocols. Mathematical Biosciences and Engineering, 2023, 20(11): 19983-20001. doi: 10.3934/mbe.2023885
    [4] Guozheng Yang, Lintao Liu, Xuehu Yan . A compressed secret image sharing method with shadow image verification capability. Mathematical Biosciences and Engineering, 2020, 17(4): 4295-4316. doi: 10.3934/mbe.2020237
    [5] Bo Wang, Yabin Li, Jianxiang Zhao, Xue Sui, Xiangwei Kong . JPEG compression history detection based on detail deviation. Mathematical Biosciences and Engineering, 2019, 16(5): 5584-5594. doi: 10.3934/mbe.2019277
    [6] Xuehu Yan, Longlong Li, Lintao Liu, Yuliang Lu, Xianhua Song . Ramp secret image sharing. Mathematical Biosciences and Engineering, 2019, 16(5): 4433-4455. doi: 10.3934/mbe.2019221
    [7] Feng Liu, Xuehu Yan, Lintao Liu, Yuliang Lu, Longdan Tan . Weighted visual secret sharing with multiple decryptions and lossless recovery. Mathematical Biosciences and Engineering, 2019, 16(5): 5750-5764. doi: 10.3934/mbe.2019287
    [8] Jingju Liu, Lei Sun, Jinrui Liu, Xuehu Yan . Fake and dishonest participant location scheme in secret image sharing. Mathematical Biosciences and Engineering, 2021, 18(3): 2473-2495. doi: 10.3934/mbe.2021126
    [9] Shudong Wang, Yuliang Lu, Xuehu Yan, Longlong Li, Yongqiang Yu . AMBTC-based visual secret sharing with different meaningful shadows. Mathematical Biosciences and Engineering, 2021, 18(5): 5236-5251. doi: 10.3934/mbe.2021266
    [10] Lina Zhang, Jing Zhang, Jiaqi Sun, Qingpeng Chen . A global progressive image secret sharing scheme under multi-group joint management. Mathematical Biosciences and Engineering, 2024, 21(1): 1286-1304. doi: 10.3934/mbe.2024055
  • JPEG is the most common format for storing and transmitting photographic images on social network platforms. JPEG image is widely used in people's life because of their low storage space and high visual quality. Secret image sharing (SIS) technology is important to protect image data. Traditional SIS schemes generally focus on spatial images, however there is little research on frequency domain images. In addition, the current tiny research on SIS for JPEG images only focuses on JPEG images with a compression quality factor (QF) of 100. To overcome the limitation of JPEG images in SIS, we propose a meaningful SIS for JPEG images to operate the quantized DCT coefficients of JPEG images. The random elements utilization model is applied to achieve meaningful shadow images. Our proposed scheme has a better quality of the shadow images and the recovered secret image. Experiment results and comparisons indicate the effectiveness of the scheme. The scheme can be used for JPEG images with any compression QF. Besides, the scheme has good characteristics, such as (k,n) threshold, extended shadow images.



    Taking Russia's control method of nuclear weapons in the 1990s as an example, Russia designed a similar "two out of three" access mechanism with the president, the defense secretary, and the defense official. Any two of the three participants jointly authorize nuclear weapons, while no single participant can use nuclear weapons. A secret sharing scheme can solve this kind of access control problem. This example is a typical (2,3) threshold secret sharing scheme.

    Blakley [1] and Shamir [2] first proposed the concept of secret sharing in 1979. The basic idea of secret sharing is to encrypt secret information into multiple shadow images or shares and distribute them to multiple participants. Only a subset of authorized participants can decrypt the secret, while nonauthorized subsets cannot. In the secret sharing scheme composed of multiple participants, the secret is divided into multiple shadow images and distributed to the corresponding participants. A secret sharing algorithm generally includes two stages: share or generate and recover.

    The original secret sharing scheme only focused on the bitstream without considering the specific meaning of these bits. With the increasing emphasis on multimedia security, the relationship between multimedia and encryption is becoming closer and closer. As one of the most important digital media carriers, image-sharing technology is becoming more and more popular. Secret image sharing(SIS) originates from secret sharing, which extends the object of secret sharing to digital images. Secret image sharing is a technology that links secret sharing and images.

    Inspired by Shamir's work, Thien and Lin [3] first used Shamir's polynomial-based secret sharing to process digital images in 2002. Thien and Lin embed secret pixels in all k1 polynomial coefficients and encrypt the secret image into a shadow image whose size is 1/k times that of the original image. This scheme reduces the size of noise like shadow images and is more suitable for fast transmission in the distributed storage environment. After Thien and Lin, polynomial based secret image sharing methods with more properties have been proposed, such as general access structure [4], extended shadow images [5,6], lossless recovery [7,8,9], multi secret sharing [10,11], two in one recovery [12,13], authentication function [14], no pixel expansion [15,16,17], etc.

    Traditional SIS schemes generate noise like shadow images, which are challenging to manage and easily arouse the suspicion of attackers in network channel transmission. More and more researchers begin to consider making secret image sharing schemes generate understandable and meaningful shadow images, that is, extended secret image sharing (ESIS) schemes with understandable shadow images. The initial ESIS scheme is a combination of SIS and steganography. Generally, the method used encodes the noise-like shadow images generated by SIS into the cover images [18,19,20]. Lin and Chan [18] generate shadow images based on polynomial SIS and embed the shadow images into the lowest bit of the cover image. He et al. [19] used LOCOI compression to reduce the statistical correlation of adjacent pixels, generated the shadow image based on polynomial SIS, and embedded the shadow image into the cover image by steganography. The disadvantage of this method is that the generated shadow image looks like an image, the capacity of the secret image is small, and the information needs to be extracted before decryption. Different from the above schemes, the author's team also designed the SIS scheme [5] for comprehensible shadow images by using the random number screening mechanism. The general idea is to randomly screen the polynomial coefficients until it is obtained that the first δ bit of the shadow pixel is equal to the first δ bit of the cover image. On the basis of the Shamir polynomial, P is required. Unlike most other secret image sharing schemes that set P=251, the author's team set P=257, limiting all values to [0,256]. Even if the shadow value is [251,255], the pixel value within the range can be recovered normally, which improves the quality of the shadow image to a certain extent, especially for extreme images.

    At present, most secret image sharing schemes deal with spatial images (such as BMP format images), while there are very few secret sharing schemes for the compressed domain. JPEG image is the most popular digital image format on the Internet. The field of JPEG image steganography is developing in full swing [21,22,23,24,25], but there is little research on secret image sharing of JPEG images. The author's team has made a preliminary exploration of JPEG secret image sharing. Sun of the author's team first proposed a secret image sharing scheme for JPEG images. Sun's scheme [26] has the following disadvantages: the translation value of the DCT coefficient is 1024, P=2053, which makes the complexity of sharing algorithm very high; When selecting the sharing area, the scheme is 8 in the upper left corner 8×8 or 4×4, and for the quantized coefficients, most of the signals are concentrated in the middle and low-frequency components in the upper left corner, and their arrangement is more in line with the zigzag arrangement while selecting a square block will cause a waste of resources; The most significant disadvantage of the scheme is that sun's scheme [26] only aims at the color JPEG image with QF=100, and the sharing effect is good. The values of the quantization table with QF=100 are all 1. Before quantization, the DCT coefficient is equal to the DCT coefficient after quantization, and there is no loss caused by rounding.

    The existing SIS scheme for JPEG images only performs well for JPEG images with QF=100. In contrast, the shadow image quality generated for JPEG images with other QF is poor. Besides, the algorithm complexity is very high.

    Our motivation is to propose a (k,n) threshold SIS meaningful secret image sharing scheme for JPEG images with arbitrary quality factors to overcome the above problems. To overcome the problem of the high algorithm complexity of the existing JPEG secret image sharing scheme, we made improvements. We calculate the minimum prime number P according to the specific secret image and cover images, reduce p to the minimum value, reduce the screening space of random numbers, and reduce the complexity of the algorithm in the secret image sharing based on polynomial. This paper selects the first 4, 9, or 16 bits after the zigzag arrangement of DCT coefficients when selecting the sharing area, which is more in line with the arrangement law of DCT coefficients after quantization and avoids the waste of computing resources. The most crucial point is that the existing technology only works well for JPEG images with QF=100, and the technology has significant limitations and cannot be popularized and applied. The compression factor of JPEG images targeted in this application can be any value between 0–100. A secret image sharing scheme for JPEG images with arbitrary compression factors is proposed, and shadow images with high image quality and restored secret images are obtained.

    The following sections are organized as follows. Section 2 introduces the encoding process of JPEG images, polynomial-based SIS, and random elements utilization model. The proposed (k,n) threshold SIS meaningful secret image sharing scheme for JPEG images with arbitrary quality factors is presented in Section 3. Section 5.1 illustrates the details of the experiments and comparisons. And Section 6 is the conclusion.

    To study the SIS scheme for JPEG images, we must start with JPEG image coding. Here we introduce the process of JPEG coding.

    The first process of JPEG image coding is preprocessing, including color space transformation, downsampling, and block segmentation. JPEG image coding first converts the color space of the spatial image into Ycbcr color space. Y component represents the brightness of pixels, and cb and cr components represent chromaticity (divided into blue and red components). Then, the image is effectively compressed by reducing cb and cr components (called "downsampling"). The gray image is discussed later, which does not consider the process of color conversion and downsampling, but only the rest of the compression process. The image is segmented to 8×8, which is processed separately in the following compression process.

    Next are the core steps of JPEG image coding: value translation, discrete cosine transform (DCT), quantization, and entropy coding. Value translation is to move the spatial pixel value from the positive range to the range centered on zero before calculating the DCT of the 8×8 block. For gray-scale images, each pixel in the original spatial block is [0,255], the translation value is 128, and the range of spatial pixel block after translation is [128,127]. S represents the spatial pixel matrix, and M represents the matrix after value translation, then the formula of value translation is shown in Eq (2.1).

    M=S128 (2.1)

    DCT transform gathers most signals in one corner of the result. The element in the top left corner is the DC coefficient, which is quite large compared with other values. The remaining 63 coefficients are AC coefficients. DCT transform can concentrate the low-frequency component in the upper left corner and the high-frequency component in the lower right corner. The primary information is concentrated in the medium and low-frequency components. Let M be the 8×8 spatial matrix for DCT transformation, then the matrix representation of DCT transformation is shown in Eq (2.2). F represents the matrix after DCT transformation. The DC component in the upper left corner of F saves a large value, and the AC component is close to 0.

    F=TMTT (2.2)

    Where T is the discrete cosine transform matrix and TT is the transpose matrix of T. The discrete cosine transform matrix T is shown in Eq (2.3).

    T=2N[121212cosπ2Ncos3π2Ncos(2N1)π2Ncos(N1)π2Ncos3(N1)π2Ncos(2N1)(2N1)π2N] (2.3)

    Human eyes are good at seeing slight differences in brightness in large areas but not at distinguishing high-frequency brightness changes. Reducing the amount of information in high-frequency components can effectively compress pictures. Quantization is to divide each DCT coefficient by the corresponding constant in the quantization table. The quantization table QM used in actual quantization is calculated by the standard quantization matrix and the specified quality factor (QF) (The calculation method is shown in Eq (2.4)). The elements in the quantization table control the compression ratio, and larger values produce more extensive compression. Then round to the nearest whole number. Many high-frequency components are rounded to zero, while many other components become small positive or negative numbers. The rounding operation is the only lossy operation in the whole compression process.

    QM(u,v)={max((2QF50)Q0(u,v)+0.5,1),50QF10050QFQ0(u,v)+0.5,0<QF<50 (2.4)

    Q0(u,v) represents the quantization step at the position (u,v) in the standard quantization table.

    Finally, the quantized value is entropy coded. Entropy coding is a lossless coding that differentially encodes the quantized DC coefficients. The quantized AC coefficients are arranged in a zigzag, then the data is compressed by 0 run-length coding, and finally, the compressed JPEG image code stream is obtained by Huffman coding.

    JPEG image decoding is the inverse of the encoding process. The core steps include entropy decoding, inverse quantization, inverse discrete cosine transform (IDCT), and value translation. Firstly, the JPEG entropy is decoded to obtain the quantized DCT coefficient, then multiplied by the DCT coefficient from the quantization table before quantization. The inverse discrete cosine transform is performed and rounded, and finally, each element of the DCT coefficient is added with 128 to obtain the decompressed spatial image.

    The scheme proposed in this paper is to share some DCT coefficients of JPEG images as secret information based on polynomial-based SIS. This section introduces polynomial-based SIS.

    In 1979, Shamir [2] and Blakley [1] independently proposed a secret sharing scheme based on polynomials, then Thien and Lin [3] applied polynomial-based secret sharing to SIS for the first time in 2002. In (k,n) threshold polynomial-based SIS, any k or more shares can recover the secret, while any k1 or fewer shares couldn't reconstruct the secret. Equation (2.5) shows the definition of the polynomial, where a0 is the secret, and the remaining k1 coefficients are randomly chosen from the field of GF(P). Lagrange interpolation is used in the recovery phase to reconstruct the secret, as shown in Eq (2.6).

    f(x)=(a0+a1x++ak1xk1)modP (2.5)
    f(x)=ki=1f(xi)kj=1ji(xxj)(xixj) (2.6)

    Using polynomial-based SIS for JPEG images is different from the spatial domain. The quantized DCT coefficients of JPEG images have negative numbers, which can not be dealt with in the traditional polynomial-based SIS schemes. It is necessary to translate the quantized DCT coefficients to the positive range. In addition, the modulus P in the polynomial is generally taken as 257 for grayscale images because the pixel value range is [0–255]. However, in the polynomial-based SIS scheme for JPEG images, the quantized DCT coefficients range from -1024 to 1023. Therefore, the P value needs to select the appropriate prime number according to the situation.

    We will use the random elements utilization model to generate meaningful shadow images in the following. Here we introduce the random elements utilization model.

    According to the principle of polynomial-based SIS, coefficients at (1tk1) are selected randomly to obtain shared values, and different coefficients at can get different shared values. Coefficients at can be regarded as random elements to obtain a specific shared value in the sharing process.

    To get meaningful shadow images, we establish random elements utilizing model as Eq (2.7). Where fi(s,a1,,ak1) is the ith shared value of secret s with random elements at,t=1,2k1, and ci represents the corresponding value in the cover image. Bδ(fi(s,a1,,ak1)ci) denotes that there are δ similar bits between fi(s,a1,,ak1) and ci, from high to low bit plane.

    ni=1|Bδ(fi(s,a1,,ak1)ci)|modp=0st{atZat[0,p),t=1,2k1δ[1,8] (2.7)

    In the sharing process, meaningful shadow images can be obtained if the above model conditions can be met. Moreover, the larger the value of δ is, the more similar the shadow image is to the cover image. The branch and bound method or Monte Carlo method can solve the above model.

    This section proposes a (k,n) threshold meaningful SIS scheme for JPEG images, including sharing and recovery processes. The object of the operation is the quantized DCT coefficients of JPEG images in the process of compression coding.

    In the sharing phase, given a secret JPEG image and chosen n cover JPEG images, the proposed scheme is to operate on the DCT coefficients of the JEPG image in the process of compression coding. Firstly, a secret JPEG image and n cover JPEG images are entropy decoded to obtain the corresponding quantized DCT coefficients, and the quantized DCT coefficients are divided into 8×8 blocks. Then, each block is zigzag arranged, and the first num bits of the data after the zigzag arrangement are extracted as the secret to be shared. The sharing process of the proposed scheme is shown in Figure 1, the schematic diagram of processing DCT coefficients is shown in Figure 2, and the specific algorithm is shown in Algorithm 1.

    Figure 1.  The sharing process of the proposed SIS for JPEG images.
    Figure 2.  the schematic diagram of processing DCT coefficients.
    Algorithm 1 The sharing process of the proposed SIS scheme for JPEG image.
    Input: A secret JPEG image S with the size of M×M; n cover JPEG images cover1,cover2,,covern; the threshold parameters (k,n); the number of shared coefficients in each block num; the number of similar bits in DCT coefficient between the shares and the cover images δ.
    Output: n shadow JPEG images SC1,SC2,,SCn.
    Step 1. Obtain the quantized DCT coefficient matrix of the secret JPEG image and the cover JPEG images by entropy decoding S and cover1,cover2,,covern.
    Step 2. Divide the quantized DCT coefficient matrix into 8×8 blocks, and each DCT block is represented as s_DCTblocki,cover1_DCTblocki,,covern_DCTblocki.
    Step 3. Zigzag arrange each DCT block of each image, and the list of the first num bits extracted is expressed as S_DCTblocklisti,cover1_DCTblocklisti,,covern_DCTblocklisti, respectively.
    Step 4. Find the minimum value min in all lists. If min0, the translation value is |min|; Otherwise, the translation value is 0.
    Step 5. Obtain the lists after translation S_DCTblocklistTi,cover1_DCTblocklistTi,,
    covern_DCTblocklistTi, according to the translation value.
    Step 6. Determine the prime number P, according to the values of all lists.
    Step 7. Input (k,n), S_DCTblocklistTi,cover1_DCTblocklistTi,,covern_DCTblocklistTi, P and δ into the random element utilization model to get the n lists of shared value.
    Step 8. Splice num bits in each list of shared value and 64num bits in corresponding cover image DCT list to get n DCT lists of the shares.
    Step 9. Obtain the actual value DCT lists of the shares by subtracting |min|.
    Step 10. Zigzag arrange each DCT lists of the shares inversely, and entropy coding them.
    Step 11. Output n shadow images SC1,SC2,,SCn.

     | Show Table
    DownLoad: CSV

    In the recovery phase, we first obtain the quantized DCT coefficients by entropy decoding k or more than k shares and divide them into blocks of 8×8. Then zigzag arranges each block and extracts the first num bit of the data after zigzag arrangement as a candidate recovery object. Next, all DCT coefficients are translated to the positive range according to |min| determined in the sharing process. The secret num bits of each block are recovered by Lagrange interpolation and translated inversely. Then add 64num zeros in each DCT block. Finally, entropy encoded the DCT blocks to obtain the recovered JPEG image. The recovery process of the proposed scheme is shown in Figure 3.

    Figure 3.  The recovery process of the proposed SIS for JPEG images.

    Because the proposed (k,n) threshold meaningful SIS scheme for JPEG images is constructed based on Shamir's traditional polynomial-based secret sharing, it retains the unconditional security of traditional polynomial-based secret sharing.

    Theorem 1. When k or less than k shadows are collected, the secret DCT coefficients can't be recovered.

    Proof. According to the polynomial secret sharing principle, the secret value is obtained by calculating a k1-degree polynomial expression with a k unknown variable. If k or less than k shadows participate in the recovery, there are be k values that satisfy the Lagrange interpolation expression. Therefore, the secret DCT coefficients can not be recovered when k or less than k shadows are collected.

    For the proposed scheme, the parameters affecting the quality of the shadows and the recovered secret image are expressed as a quintuple (k,n,δ,num,QF). Where (k,n) represents the threshold parameter, and δ denotes the number of similar bits in the DCT coefficient between the shares and the cover images, num represents the number of shared coefficients in each block, QF is the compression factor of the secret JPEG image.

    In the proposed scheme, the secret recovery image is lossy. There are two reasons as follows:

    ● The secret image is distorted in the sharing process. The DCT block of each secret JPEG image only shares the first num bit data after the zigzag arrangement, not all DCT coefficients. For the convenience of calculation, num is usually a square number. In addition, the quantized DCT coefficient matrix signal is concentrated in the upper left part, so num is preferably less than 32. Therefore, num is generally set to 4, 9, or 16.

    ● The secret image is distorted in the recovery process. There are 64 bits in each DCT block, while num bits can be recovered, and the remaining 64num DCT coefficients are filled with zeros.

    Based on the above analysis, we discuss the following three situations:

    1) When (k,n,δ,QF) is set as non-constant, the smaller the num is, the fewer DCT coefficients are shared, and the more DCT coefficients of the cover image are retained. The higher the similarity between the shadow image and the cover image is. However, the smaller the num is, the more zeros will be filled, so the lower the quality of the restored secret image.

    2) When (k,n,num,QF) is fixed, the higher the δ is, the higher the quality of the shadow image is. Because there are more similar bits in DCT coefficient between the shares and the cover images, the δ is limited by the (k,n) threshold to generate meaningful shadow images. When the prime number is set to P, there are (P1)k1 possible shadow value sequences for the DCT coefficients currently processed. The relationship between (k,n,P,δ) should satisfy Eq (4.1).

    (2δ)n(P1)k1 (4.1)

    3) When (num,P,QF) is non-constant, the PSNR of the restored secret image is the same no matter how (k,n,δ) changes. The number of DCT coefficients of each block shared determines the amount of secret information carried by the shadow image carries. The amount of secret information in the recovered secret image is also constant.

    To verify the effectiveness of the proposed scheme, we implemented some experiments. The performance results will be exhibited in Subsection 5.1. The experimental images in the section are chosen from BOSSbase1.0.5 [27]. Grayscale images with 256×256 are randomly selected and converted into JPEG images with compression factors of 40, 50, 60, 70, 75, and 80. The function of read() and write() in the JPEGIO package is used to simulate entropy decoding and entropy coding. In addition, the proposed scheme is compared with Yan et al.'s scheme in Subsection 5.2.

    To show the effect of the proposed scheme more comprehensively, we carried out experiments from the following two aspects in this subsection. First, different thresholds should be taken into consideration. Besides, the quintuple (k,n,δ,num,QF) may also influence the performance of the experiments.

    Figure 4 illustrates the results of (3,4)-threshold meaningful SIS scheme for JPEG images, where δ=3, num=9, id=[11,13,19,21] (id is actually the value of x in the polynomial, which refers to xi in Eq (2.6)), QF=75. The secret grayscale JPEG image with the size of 256×256 and QF=75 is shown in Figure 4a. Figure 4cf show the four grayscale JPEG images with the size 256×256 as the input cover images. Four shadow JPEG images changed from cover images are shown in Figure 4gj. Figure 4b shows the recovered secret JPEG image.

    Figure 4.  Results of (3,4)-threshold SIS scheme for JPEG images with meaningful shares, δ=3, num=9, id=[11,13,19,21], QF=75.

    Figure 5 exhibits the results of (3,3)-threshold meaningful SIS scheme for JPEG image, where δ=4, num=9, id=[11,13,19], QF=75. Figure 5a is a secret grayscale JPEG image with the size of 256×256 and QF=75. Figure 5bd show the three grayscale JPEG images with the size 256×256 as the input cover images. Figure 5eg show three shadow JPEG images. The recovered secret JPEG image is displayed in Figure 5h.

    Figure 5.  Results of (3,3)-threshold SIS scheme for JPEG images with meaningful shares, δ=4, num=9, id=[11,13,19], QF=75.

    Figure 5 shows our (2,2)-threshold scheme, where δ=3, num=9, id=[11,13], QF=75. Figure 6a displays the secret grayscale JPEG image of 256×256 and QF=75. Figure 6b, c show the grayscale JPEG cover images with the size 256×256. Figure 6d, e show two JPEG shadow images. The recovered secret JPEG image is shown in Figure 6f.

    Figure 6.  Results of (2,2)-threshold SIS scheme for JPEG images with meaningful shares, δ=3, num=9, id=[11,13], QF=75.

    Table 1 shows visual quality of shadow images under different parameter selections. The variation trend of PSNR of shadow images and recovered secret image with parameters num and QF are shown in Figures 7 and 8, respectively.

    Table 1.  Visual quality of shadow image under different parameter selection.
    (k,n) (3,4) (3,3) (2,2)
    δ 3 4 3
    num 4 9 16 4 9 16 4 9 16
    Quality PSNR PSNR PSNR PSNR PSNR PSNR PSNR PSNR PSNR
    SC1 20.84 18.10 14.21 27.66 24.78 20.59 21.52 18.59 14.68
    SC2 19.86 17.53 13.70 27.50 24.13 20.16 21.30 18.13 14.52
    SC3 20.21 18.12 14.43 27.90 24.92 20.47
    SC4 20.42 17.55 13.32
    S 24.37 28.28 30.48 24.37 28.28 30.48 24.37 28.28 30.48

     | Show Table
    DownLoad: CSV
    Figure 7.  When (k,n,δ,QF) is fixed to (3,3,4,75), the PSNR of shadow images and recovered secret image changes with num.

    From Figures 48 and Table 1, we can draw the following conclusions:

    Figure 8.  When (k,n,δ,num) is fixed to (3,3,4,9), the PSNR of shadow images and recovered secret image changes with QF.

    1) Our proposed SIS scheme for JPEG images is effective, and the shadow images are meaningful.

    2) The factors affecting the visual quality of shadow images and recovered secret image are consistent with the performance analysis in Subsection 4.2.

    3) When (k,n,δ) is fixed, the larger the num is, the lower the PSNR of the shadow images are, and the higher the recovered secret image's quality.

    4) When num is the same, the PSNR of the recovered secret image remains unchanged.

    5) With the increase of QF, the visual quality of the shadow images is better, while the recovered secret image's quality decreases slightly.

    In a sense, the work proposed in this paper can be regarded as a robust secret image sharing scheme for spatial images against JPEG compression, as shown in Figure 9. Our (3,3) threshold JPEG oriented secret image sharing scheme can be regarded as follows: the spatial image "S.bmp" is first compressed into "S.jpg" by the channel with QF=75; "S.jpg" generates "SC1.jpg", "SC2.jpg" and "SC3.jpg" after the SIS for JPEG images generation algorithm proposed in this paper. These three images are equivalent to "SC1.bmp", "SC2.bmp" and "SC3.bmp" through channel compression with QF=75. During restoration, "SC1.jpg", "SC2.jpg", "SC3.jpg" restore the secret image through the restoration algorithm of the scheme proposed in this paper to obtain "S*.jpg" and finally compresses it to the airspace to obtain "S*.bmp". This restoration process is equivalent to restoring the secret image from the decompressed spatial image "SC1.bmp", "SC2.bmp" and "SC3.bmp" to obtain "S*.bmp". The whole process corresponds to the scheme proposed by Yan et al. (As shown in Figure 10).

    Figure 9.  Extended (3,3) threshold SIS for JPEG images.
    Figure 10.  (3,3) threshold robust SIS by Yan et al.

    Therefore, here we compare our scheme with Yan et al.'s work [28]. Yan et al. implemented a robust secret image sharing scheme with (k,n) threshold without pixel expansion based on the Chinese Remainder Theorem and error-correcting codes. The scheme uses the method of random screening mechanism to integrate the process of shadow image generation with the process of generating error correction code and generating error correction code while generating shadow so that the generated shadow image itself has internal error correction ability. Considering that the general noise or attack will affect the lower bits of the shadow pixel, such as the lower four bits, the scheme forms an error correction relationship between the lower four bits of the previous pixel and the upper four bits of the next adjacent pixel in the process of generating the shadow, so when the lower four bits of the second pixel are wrong, The high four bits of the previous pixel can correct its error (provided that the noise or attack has little impact on the high four bits, and the high four bits are relatively stable and will not change). In this way, the pixels of the shadow image are generated in turn. And a cascading error correction relationship is formed between the pixels. A slight disadvantage is that the error of the lower four bits of the last pixel cannot be corrected. The scheme realizes the (k,n) threshold and is robust to JPEG compression.

    Figure 11 shows the results of the robust (3,3) threshold SIS scheme proposed by Yan et al., where m1=253, m2=254, m3=255, HL=8, QF=100. Figure 11(a) is the secret image. One shadow image generated is shown in Figure 11(b). The image of the shadow image after JPEG compression with QF=100 is shown in Figure 11(c). Figure 11(d) displays the difference between the shadow image and the compressed image. The recovered secret image is shown in Figure 11(e).This paper proposes the (k,n)-threshold SIS scheme for JPEG images with meaningful shares. The proposed scheme can be regarded as a robust SIS scheme for spatial images against JPEG compression. As shown in Figure 5, the PSNR of the recovered secret image in our proposed with QF=75 is higher than that in Yan et al.'s scheme with QF=100. So the proposed SIS scheme for JPEG images has better robustness to JPEG compression. In addition, compared with the Yan et al.'s scheme, the shadow image in our scheme is meaningful and can be applied to JPEG images of any QF.

    Figure 11.  Results of the robust (3,3) threshold SIS scheme proposed by Yan et al., m1=253, m2=254, m3=255, HL=8, QF=100.

    The scheme of Yan et al. [28] is not powerfully robust to JPEG compression because its scheme is designed on the premise that the attack has little impact on the higher bits of the pixel (relatively stable and will not change). This assumption is more consistent with Gaussian noise's impact on the pixel than the impact of JPEG compression on the image. JPEG compression will affect all pixels of the shadow image; When the pixel values before and after compression do not change, there is a specific error correction capability between adjacent pixels. If one of them changes, the error correction capability will be destroyed.

    This paper proposed a (k,n) threshold meaningful SIS scheme for JPEG images, which can apply to JPEG images of any QF. Starting with the study of JPEG image encoding and decoding, this paper realizes the SIS scheme for JPEG images. Besides, we analyze the reasons for the loss of recovered secret images. We further analyze the impact of the parameters (k,n,δ,num,QF) on the quality of shadow images and recovered secret image. The experimental results indicate the effectiveness of the scheme. The scheme has good characteristics, such as (k,n) threshold and extended shadow images. It can effectively share JPEG images with arbitrary compression factors. In future work, we will focus on a robust SIS scheme against JPEG recompression.

    This research is funded by the National Natural Science Foundation of China (Grant Number: 61602491).

    The authors declare there is no conflict of interest.



    [1] G. Blakley, Safeguarding cryptographic keys, Proc. Afips Natl. Comput. Conf., 48 (1979), 313. https://doi.org/10.1109/AFIPS.1979.98 doi: 10.1109/AFIPS.1979.98
    [2] A. Shamir, How to share a secret, Commun. ACM, 22 (1979), 612–613. https://doi.org/10.1145/359168.359176 doi: 10.1145/359168.359176
    [3] C. Thien, J. Lin, Secret image sharing, Comput. Graphics, 26 (2002), 767–770. https://doi.org/10.1016/S0097-8493(02)00131-0 doi: 10.1016/S0097-8493(02)00131-0
    [4] J. B. Feng, H. C. Wu, C. S. Tsai, Y. P. Chu, A new multi-secret images sharing scheme using largrange's interpolation, J. Syst. Software, 76 (2005), 326–339. https://doi.org/10.1016/j.jss.2004.07.250 doi: 10.1016/j.jss.2004.07.250
    [5] T. Liu, L. Lu, H. Yan, Polynomial-based extended secret image sharing scheme with reversible and unexpanded covers, Multimedia Tools Appl., 78 (2018), 1–23. https://doi.org/10.1007/s11042-018-6202-3 doi: 10.1007/s11042-018-6202-3
    [6] H. Yan, L. Lu, T. Liu, General meaningful shadow construction in secret image sharing, IEEE Access, 6 (2018), 45246–45255. https://doi.org/10.1109/ACCESS.2018.2865421 doi: 10.1109/ACCESS.2018.2865421
    [7] X. Liu, S. Wang, Z. Sang, Z. Zhang, A novel lossless recovery algorithm for basic matrix-based VSS, Multimedia Tools Appl., 77 (2018), 16461–16476. https://doi.org/10.1007/s11042-017-5215-7 doi: 10.1007/s11042-017-5215-7
    [8] N. Yang, S. Chen, H. Yu, C. Wang, Improvements of image sharing with steganography and authentication, J. Syst. Software, 80 (2006), 1070–1076. https://doi.org/10.1016/j.jss.2006.11.022 doi: 10.1016/j.jss.2006.11.022
    [9] T. Liu, L. Lu, M. Ding, T. Xuan, A Lossless polynomial-based secret image sharing scheme utilizing the filtering operation, Secur. Intell. Comput. Big-data Serv., 895 (2020), 129–139. https://doi.org/10.1007/978-3-030-16946-6_11 doi: 10.1007/978-3-030-16946-6_11
    [10] P. Li, J. Ma, H. Su, N. Yang, Improvements of a two-in-one image secret sharing scheme based on gray mixing model, J. Visual Commun. Image Represent., 23 (2012), 441–453. https://doi.org/10.1016/j.jvcir.2012.01.003 doi: 10.1016/j.jvcir.2012.01.003
    [11] J. Weir, Q. Yan, Sharing multiple secrets using visual cryptography, IEEE Int. Symp. Circuits Syst., 2009. https://doi.org/10.1109/ISCAS.2009.5117797 doi: 10.1109/ISCAS.2009.5117797
    [12] P. Li, N. Yang, Q. Kong, A novel two-in-one image secret sharing scheme based on perfect black visual cryptography, J. Real-Time Image Process., 14 (2018), 41–50. https://doi.org/10.1007/s11554-016-0621-z doi: 10.1007/s11554-016-0621-z
    [13] X. Liu, S. Wang, Z. Sang, Z. Zhang, A novel mapping-based lossless recovery algorithm for vss, J. Real-Time Image Process., 14 (2016), 51–60. https://doi.org/10.1007/s11554-016-0644-5 doi: 10.1007/s11554-016-0644-5
    [14] Y. Jiang, Q. Qi, L. Lu, X. Zhou, Secret image sharing with dealer-participatory and non-dealer-participatory mutual shadow authentication capabilities, Mathematice, 8 (2020), 234. https://doi.org/10.3390/math8020234 doi: 10.3390/math8020234
    [15] H. Yan, X. Liu, N. Yang, An enhanced threshold visual secret sharing based on random grids, J. Real-Time Image Process., 14 (2015), 61–73. https://doi.org/10.1007/s11554-015-0540-4 doi: 10.1007/s11554-015-0540-4
    [16] N. Yang, New visual secret sharing schemes using probabilistic method, Pattern Recognit. Lett., 25 (2004), 481–494. https://doi.org/10.1016/j.patrec.2003.12.011 doi: 10.1016/j.patrec.2003.12.011
    [17] Z. Wang, H. Su, Secret image sharing with smaller shadow images, Pattern Recognit. Lett., 27 (2006), 551–555. https://doi.org/10.1016/j.patrec.2005.09.021 doi: 10.1016/j.patrec.2005.09.021
    [18] Y. Lin, H. Chan, Invertible secret image sharing with steganography, Pattern Recognit. Lett., 31 (2010), 1887–1893. https://doi.org/10.1016/j.patrec.2010.01.019 doi: 10.1016/j.patrec.2010.01.019
    [19] F. Liu, K. Wu, Embedded extended visual cryptography schemes, IEEE Trans. Inf. Forensics Secur., 2 (2011), 307–322. https://doi.org/10.1109/TIFS.2011.2116782 doi: 10.1109/TIFS.2011.2116782
    [20] H. He, Q. Lan, H. Tang, A secure image sharing scheme with high quality stego-images based on steganography, Multimedia Tools Appl., 76 (2017), 7677–7698. https://doi.org/10.1007/s11042-016-3429-8 doi: 10.1007/s11042-016-3429-8
    [21] J. Chen, H. Zhou, B. Zhou, Defining cost functions for adaptive jpeg steganography at the microscale, IEEE Trans. Inf. Forensics Secur., 14 (2019), 1052–1066. https://doi.org/10.1109/TIFS.2018.2869353 doi: 10.1109/TIFS.2018.2869353
    [22] Y. Tao, S. Li, P. Zhang, C. Wang, Towards Robust Image Steganography, IEEE Trans. Circuits Syst. Video Technol., 29 (2021), 594–600. https://doi.org/10.1109/TCSVT.2018.2881118 doi: 10.1109/TCSVT.2018.2881118
    [23] Z. Zhao, X. Guan, H. Zhang, F. Zhao, Improving the robustness of adaptive steganographic algorithms based on transport channel matching, IEEE Trans. Inf. Forensics Secur., 14 (2019), 1843–1856. https://doi.org/10.1109/TIFS.2018.2885438 doi: 10.1109/TIFS.2018.2885438
    [24] Y. Wang, M. Zhang, X. Li, H. Yu, Non-additive cost functions for jpeg steganography based on block boundary maintenance, IEEE Trans. Inf. Forensics Secur., 16 (2021), 1117–1130. https://doi.org/10.1109/TIFS.2020.3029908 doi: 10.1109/TIFS.2020.3029908
    [25] T. Taburet, P. Bas, W. Sawaya, J. Fridrich, Natural steganography in jpeg domain with a linear development pipeline, IEEE Trans. Inf. Forensics Secur., 16 (2020), 173–186. https://doi.org/10.1109/TIFS.2020.3007354 doi: 10.1109/TIFS.2020.3007354
    [26] Y. Sun, Research on Key Technologies of Robust and Meaningful Secret Image Sharing, Master's thesis, National University of Defense Technology in Hefei, 2020. In press.
    [27] P. Bas, T. Filler, P. Tomas, "Break our steganographic system": the ins and outs of organizing BOSS, in Information Hiding, International Workshop on Information Hiding, (2011), 59–70. https://doi.org/10.1007/978-3-642-24178-9_5
    [28] H. Yan, T. Liu, L. Li, L. Lu, Robust secret image sharing resistant to noise in shares, ACM Trans. Multimedia Comput., Commun., Appl., 24 (2021), 1–22. https://doi.org/10.1145/3419750 doi: 10.1145/3419750
  • This article has been cited by:

    1. Juncai Yao, Jing Shen, Congying Yao, Image quality assessment based on the perceived structural similarity index of an image, 2023, 20, 1551-0018, 9385, 10.3934/mbe.2023412
    2. Yue Jiang, Kejiang Chen, Wei Yan, Xuehu Yan, Guozheng Yang, Kai Zeng, Robust Secret Image Sharing Resistant to JPEG Recompression Based on Stable Block Condition, 2024, 26, 1520-9210, 10446, 10.1109/TMM.2024.3407694
  • Reader Comments
  • © 2022 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(1921) PDF downloads(61) Cited by(2)

Figures and Tables

Figures(11)  /  Tables(1)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog