Meaningful Secret Image Sharing with Saliency Detection
Abstract
:1. Introduction
2. Preliminaries
2.1. Polynomial-Based Sis
2.2. Saliency Detection
3. The Proposed Scheme
Algorithm 1. The Sharing Phase of Our Proposed Scheme. |
Input: a grayscale secret image S with a size of W × H; n grayscale cover images with a size of W × H; |
Output: n meaningful shadows , , …,. |
Step 1: Use the LC algorithm to calculate the saliency values for every pixel in cover . |
Note the saliency values as , , …, . |
Step 2: Compare and , …,, which are the saliency values of the same pixel position of n covers.. |
Step 3: Utilize the random elements utilization model and the result of Step 2 to screen the shadow pixel values. |
Step 4: Repeat Step 2 and Step 3 until all secret image pixels have been shared. |
Step 5: Output n meaningful grayscale shadow images . |
3.1. Design Concept
3.2. Random Elements Utilization Model
3.3. Our Scheme
- The salient regions have a greater influence on human visual perception than other regions. We improve the visual quality of the shadows by improving the visual quality of the salient region.
- We apply the LC algorithm to calculate the saliency values for every pixel in each cover. Saliency values are used to measure the importance of corresponding pixels. A larger saliency value indicates that the cover pixel is in a salient region, while a cover pixel with a smaller saliency value is in a non-salient (less important) region.
- In our scheme, the sum of identical higher bits for all shadows is limited. With the random elements utilization model and the comparison results in Step 2, we distribute more identical higher bits to salient regions and less to non-salient regions. Thus, the salient regions obtain better visual quality and are more similar to corresponding regions in cover images. Moreover the distribution process is adaptive to different shadow images.
- There is a limitation on the sum of identical higher bits for all shadows. Since we choose 257 as the prime number, the total number of sharing values is . In our scheme, the total number of satisfied sharing values is . To ensure the successful sharing process, the sum of identical higher bits should be subject to .
- Polynomial-based SIS is used to share the secret pixels, and a prime number P of 257 is chosen to ensure lossless recovery. In the recovery phase, the secret image can be losslessly reconstructed by Lagrange interpolation. The recovery operation complexity is [39].
4. Experiments and Discussion
4.1. Image Illustration
4.2. Quality Evaluation Metrics
4.3. Comparisons with Relative Methods
4.4. Analysis and Discussion
- The PSNR of the IBDR method is close to ours. However, PSNR is calculated based on the discrepancy between the corresponding two pixel values, while the visual characteristics of human eyes are not taken into account. For example, human eyes are sensitive to luminance and texture and are usually influenced by the neighboring regions around the target object. The PSNR values are often inconsistent with the subjective judgment of human eye perception.
- To further compare our scheme with IBDR, we calculated the indicators SSIM and UQI, which can better reflect the overall structure of images. As exhibited in Table 2, the higher values of SSIM and UQI show that our scheme is more effective than IBDR.
- In our scheme, saliency detection is applied, which can effectively improve the visual quality of salient regions in shadows. For instance, the lines on the deck of the warship in Figure 3e can be clearly distinguished, but they are blurred in the corresponding shadows of other relative schemes. Our scheme exhibits the details of shadow images more accurately. The structural characteristics are used in saliency detection, so the outline of the cars in Figure 5o are clearer than in Figure 5k. These are also demonstrated with SSIM and UQI in Table 2.
- The relative meaningful SIS schemes process each pixel individually. However, the color, texture and luminance among neighboring pixels have a strong correlation. They are sensitive to human eye perception. Our proposed scheme takes the correlation among neighboring pixels and structural characteristics into account by utilizing saliency detection. According to the random elements utilization model, the identical higher bit distribution process is adaptive to different shadow images. Then, the visual quality of saliency regions of shadows can be improved adaptively.
- Our scheme performs well with small thresholds such as and . For larger thresholds such as or , the total number of identical bits is . Because there are enough identical higher bits for each pixel and the lower bits have a smaller influence on visual quality, both the salient and less salient regions can obtain satisfied visual quality. In this condition, saliency detection is not very effective with large thresholds.
- The LC algorithm can identify the salient regions accurately in our scheme. However, there are also some limitations. The sum of Euclidean distances between pixel values is calculated to obtain the saliency map in the LC algorithm. Mistakes will be involved when pixels with rare pixel values mistakenly gain high saliency values. Other saliency detection methods, such as FT [37], AC [36] and RC [33], can also be used in our scheme to obtain accurate saliency maps.
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Muhammad, K.; Hamza, R.; Ahmad, J.; Lloret, J.; Wang, H.; Baik, S.W. Secure surveillance framework for IoT systems using probabilistic image encryption. IEEE Trans. Ind. Inform. 2018, 14, 3679–3689. [Google Scholar] [CrossRef]
- Zhou, H.; Chen, K.; Zhang, W.; Yao, Y.; Yu, N. Distortion design for secure adaptive 3-d mesh steganography. IEEE Trans. Multimed. 2018, 21, 1384–1398. [Google Scholar] [CrossRef]
- Wang, J.; Zhang, L.Y.; Chen, J.; Hua, G.; Zhang, Y.; Xiang, Y. Compressed sensing based selective encryption with data hiding capability. IEEE Trans. Ind. Inform. 2019, 15, 6560–6571. [Google Scholar] [CrossRef]
- Fukumitsu, M.; Hasegawa, S.; Iwazaki, J.Y.; Sakai, M.; Takahashi, D. A proposal of a secure P2P-type storage scheme by using the secret sharing and the blockchain. In Proceedings of the 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA), Taipei, Taiwan, 27–29 March 2017; pp. 803–810. [Google Scholar]
- Li, Y.; Guo, L. Robust image fingerprinting via distortion-resistant sparse coding. IEEE Signal Process. Lett. 2017, 25, 140–144. [Google Scholar] [CrossRef]
- Chavan, P.V.; Atique, M.; Malik, L. Signature based authentication using contrast enhanced hierarchical visual cryptography. In Proceedings of the 2014 IEEE Students’ Conference on Electrical, Electronics and Computer Science, Bhopal, India, 1–2 March 2014; pp. 1–5. [Google Scholar]
- Attasena, V.; Darmont, J.; Harbi, N. Secret sharing for cloud data security: A survey. VLDB J. 2017, 26, 657–681. [Google Scholar] [CrossRef]
- Komargodski, I.; Naor, M.; Yogev, E. Secret-sharing for NP. J. Cryptol. 2017, 30, 444–469. [Google Scholar] [CrossRef]
- Shamir, A. How to share a secret. Commun. ACM 1979, 22, 612–613. [Google Scholar] [CrossRef]
- Naor, M.; Shamir, A. Visual cryptography. In Workshop on the Theory and Application of of Cryptographic Techniques; Springer: Berlin/Heidelberg, Germany, 1994; pp. 1–12. [Google Scholar]
- Wang, G.; Liu, F.; Yan, W.Q. Basic visual cryptography using braille. Int. J. Digit. Crime Forensics (IJDCF) 2016, 8, 85–93. [Google Scholar] [CrossRef] [Green Version]
- Yan, W.; Ding, W.; Dongxu, Q. Image sharing based on chinese remainder theorem. J. North China Univ. Tech 2000, 12, 6–9. [Google Scholar]
- Chuang, T.W.; Chen, C.C.; Chien, B. Image sharing and recovering based on Chinese remainder theorem. In Proceedings of the 2016 International Symposium on Computer, Consumer and Control (IS3C), Xi’an, China, 4–6 July 2016; pp. 817–820. [Google Scholar]
- Yan, X.; Lu, Y.; Liu, L.; Wan, S.; Ding, W.; Liu, H. Chinese remainder theorem-based secret image sharing for (k, n) threshold. In Proceedings of the International Conference on Cloud Computing and Security, Nanjing, China, 16–18 June 2017; Springer: Cham, Switzerland, 2017; pp. 433–440. [Google Scholar]
- Li, P.; Ma, P.J.; Su, X.H.; Yang, C.N. Improvements of a two-in-one image secret sharing scheme based on gray mixing model. J. Vis. Commun. Image Represent. 2012, 23, 441–453. [Google Scholar] [CrossRef]
- He, J.; Lan, W.; Tang, S. A secure image sharing scheme with high quality stego-images based on steganography. Multimed. Tools Appl. 2017, 76, 7677–7698. [Google Scholar] [CrossRef]
- Yang, C.N.; Ciou, C.B. Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability. Image Vis. Comput. 2010, 28, 1600–1610. [Google Scholar] [CrossRef]
- Li, P.; Yang, C.N.; Kong, Q.; Ma, Y.; Liu, Z. Sharing more information in gray visual cryptography scheme. J. Vis. Commun. Image Represent. 2013, 24, 1380–1393. [Google Scholar] [CrossRef]
- Mert, A.C.; Öztürk, E.; Savaş, E. Design and implementation of a fast and scalable NTT-based polynomial multiplier architecture. In Proceedings of the 2019 22nd Euromicro Conference on Digital System Design (DSD), Kallithea, Greece, 28–30 August 2019; pp. 253–260. [Google Scholar]
- Feng, X.; Li, S.; Xu, S. RLWE-oriented high-speed polynomial multiplier utilizing multi-lane stockham NTT algorithm. IEEE Trans. Circuits Syst. II Express Briefs 2019, 67, 556–559. [Google Scholar] [CrossRef]
- Bisheh-Niasar, M.; Azarderakhsh, R.; Mozaffari-Kermani, M. High-speed NTT-based polynomial multiplication accelerator for CRYSTALS-Kyber post-quantum cryptography. In Proceedings of the 2021 IEEE 28th Symposium on Computer Arithmetic (ARITH), Lyngby, Denmark, 14–16 June 2021; pp. 94–101. [Google Scholar]
- Ateniese, G.; Blundo, C.; De Santis, A.; Stinson, D.R. Extended capabilities for visual cryptography. Theor. Comput. Sci. 2001, 250, 143–161. [Google Scholar] [CrossRef] [Green Version]
- Yuan, H.D. Secret sharing with multi-cover adaptive steganography. Inf. Sci. 2014, 254, 197–212. [Google Scholar] [CrossRef]
- Cheng, T.F.; Chang, C.C.; Liu, L. Secret sharing: Using meaningful image shadows based on gray code. Multimed. Tools Appl. 2017, 76, 9337–9362. [Google Scholar] [CrossRef]
- Chiu, P.L.; Lee, K.H. Efficient constructions for progressive visual cryptography with meaningful shares. Signal Process. 2019, 165, 233–249. [Google Scholar] [CrossRef]
- Avci, D. A novel meaningful secret image sharing method based on Arabic letters. Kuwait J. Sci. 2016, 43, 114–124. [Google Scholar]
- Wu, X.; Sun, W. Generalized random grid and its applications in visual cryptography. IEEE Trans. Inf. Forensics Secur. 2013, 8, 1541–1553. [Google Scholar] [CrossRef]
- Yang, C.N.; Yang, Y.Y. New extended visual cryptography schemes with clearer shadow images. Inf. Sci. 2014, 271, 246–263. [Google Scholar] [CrossRef]
- Liu, L.; Lu, Y.; Yan, X. Polynomial-based extended secret image sharing scheme with reversible and unexpanded covers. Multimed. Tools Appl. 2019, 78, 1265–1287. [Google Scholar] [CrossRef]
- Yan, X.; Lu, Y.; Liu, L.; Song, X. Reversible image secret sharing. IEEE Trans. Inf. Forensics Secur. 2020, 15, 3848–3858. [Google Scholar] [CrossRef]
- Duncan, J.; Humphreys, G.W. Visual search and stimulus similarity. Psychol. Rev. 1989, 96, 433. [Google Scholar] [CrossRef] [PubMed]
- Zhai, Y.; Shah, M. Visual attention detection in video sequences using spatiotemporal cues. In Proceedings of the 14th ACM International Conference on Multimedia, Santa Barbara, CA, USA, 23–27 October 2006; pp. 815–824. [Google Scholar]
- Cheng, M.M.; Mitra, N.J.; Huang, X.; Torr, P.H.; Hu, S.M. Salient object detection and segmentation. IEEE Trans. Pattern Anal. Mach. Intell. 2013, 37, 1. [Google Scholar]
- Huang, Y.; Qiu, C.; Yuan, K. Surface defect saliency of magnetic tile. Vis. Comput. 2020, 36, 85–96. [Google Scholar] [CrossRef]
- Wang, X.; Ma, H.; Chen, X.; You, S. Edge preserving and multi-scale contextual neural network for salient object detection. IEEE Trans. Image Process. 2017, 27, 121–134. [Google Scholar] [CrossRef] [Green Version]
- Achanta, R.; Estrada, F.; Wils, P.; Süsstrunk, S. Salient region detection and segmentation. In Proceedings of the International Conference on Computer Vision Systems, Santorini, Greece, 12–15 May 2008; Springer: Berlin/Heidelberg, Germany, 2008; pp. 66–75. [Google Scholar]
- Achanta, R.; Hemami, S.; Estrada, F.; Susstrunk, S. Frequency-tuned salient region detection. In Proceedings of the 2009 IEEE Conference on Computer Vision and Pattern Recognition, Miami, FL, USA, 20–25 June 2009; pp. 1597–1604. [Google Scholar]
- Goferman, S.; Zelnik-Manor, L.; Tal, A. Context-aware saliency detection. IEEE Trans. Pattern Anal. Mach. Intell. 2011, 34, 1915–1926. [Google Scholar] [CrossRef] [Green Version]
- Asmuth, C.; Bloom, J. A modular approach to key safeguarding. IEEE Trans. Inf. Theory 1983, 29, 208–210. [Google Scholar] [CrossRef]
- Wang, Z.; Bovik, A.C.; Sheikh, H.R.; Simoncelli, E.P. Image quality assessment: From error visibility to structural similarity. IEEE Trans. Image Process. 2004, 13, 600–612. [Google Scholar] [CrossRef] [Green Version]
- Wang, Z.; Bovik, A.C. A universal image quality index. IEEE Signal Process. Lett. 2002, 9, 81–84. [Google Scholar] [CrossRef]
Threshold | Schemes | Shadows1 | Shadow2 | Shadow3 | Average |
---|---|---|---|---|---|
(2,2) | Liu | 10.6781 | 10.6942 | 10.6861 | |
Ours | 22.4381 | 20.4256 | 21.4318 | ||
(2,3) | Yan | 7.9441 | 8.2266 | 8.1357 | 8.1021 |
IBDR | 16.4911 | 17.2531 | 17.5863 | 17.1101 | |
Ours | 16.7203 | 18.2884 | 18.2662 | 17.7583 |
Schemes | Metrics | Shadows1 | Shadow2 | Shadow3 | Average |
---|---|---|---|---|---|
IBDR | SSIM | 0.4362 | 0.1089 | 0.1677 | 0.2376 |
UQI | 0.4659 | 0.0751 | 0.1461 | 0.2291 | |
Ours | SSIM | 0.4647 | 0.1599 | 0.2213 | 0.2817 |
UQI | 0.4892 | 0.1182 | 0.1853 | 0.2642 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Cheng, J.; Yan, X.; Liu, L.; Jiang, Y.; Wang, X. Meaningful Secret Image Sharing with Saliency Detection. Entropy 2022, 24, 340. https://doi.org/10.3390/e24030340
Cheng J, Yan X, Liu L, Jiang Y, Wang X. Meaningful Secret Image Sharing with Saliency Detection. Entropy. 2022; 24(3):340. https://doi.org/10.3390/e24030340
Chicago/Turabian StyleCheng, Jingwen, Xuehu Yan, Lintao Liu, Yue Jiang, and Xuan Wang. 2022. "Meaningful Secret Image Sharing with Saliency Detection" Entropy 24, no. 3: 340. https://doi.org/10.3390/e24030340
APA StyleCheng, J., Yan, X., Liu, L., Jiang, Y., & Wang, X. (2022). Meaningful Secret Image Sharing with Saliency Detection. Entropy, 24(3), 340. https://doi.org/10.3390/e24030340