Repository logo
 

Optimal Access Structure Partition Methods for Image Secret Sharing

aut.relation.endpage1
aut.relation.journalIEEE Transactions on Information Forensics and Security
aut.relation.startpage1
dc.contributor.authorWu, Xiaotian
dc.contributor.authorTang, Li
dc.contributor.authorXia, Zhihua
dc.contributor.authorYang, Ching-Nung
dc.contributor.authorYan, Weiqi
dc.date.accessioned2026-01-06T21:53:48Z
dc.date.available2026-01-06T21:53:48Z
dc.date.issued2025-12-19
dc.description.abstractVisual cryptography scheme (VCS) and polynomial-based secret image sharing (PSIS) are two primary types of secret sharing for protecting images. VCS and PSIS have their respective pros and cons. For VCS, the benefits of perfect security and easy decoding are provided. But it suffers from the limitations of lossy secret recovery and binary image-oriented. PSIS can deal with grayscale/color images and offers lossless secret reconstruction. Whereas, the secret decoding is computationally intensive (i.e., O(klog²k) for (k,n) threshold) and the residual-image problem in PSIS compromises the security. In this paper, we are motivated to investigate a sharing technique that can preserve the advantages of both VCS and PSIS. Differing from existing VCS and PSIS, the proposed sharing method is accomplished based on the access structure partition (ASP) result. Essentially, an ASP guided image secret sharing approach is developed and three optimal ASP algorithms are designed. When compared with existing partition method, significant improvement is offered by our partition techniques especially for the (k,n) threshold with a larger n . Take the (2,15) , (2,18) , and (4,12) thresholds for example, the numbers of involved sub-access structures by our method are 4, 5, and 19, while the quantities by existing approach are 8, 10, and 45. The percentages of improvement are 100%, 100%, and 137%. Further, based on the partition result from ASP algorithms, we can employ (k,k) probabilistic VCS (PVCS) to constitute a (k,n) sharing method for encoding gray-level/color images. Experiments are demonstrated to confirm the effectiveness of the sharing method and ASP algorithms. Meanwhile, comparisons are included to show that the merits of perfect security, low decoding complexity (i.e., O(d) ), lossless secret recovery (i.e., PSNR =∞ , SSIM= 1), and grayscale/color image-oriented are provided by our sharing method.
dc.identifier.citationIEEE Transactions on Information Forensics and Security, ISSN: 1556-6013 (Print); 1556-6021 (Online), Institute of Electrical and Electronics Engineers (IEEE), 1-1. doi: 10.1109/tifs.2025.3645631
dc.identifier.doi10.1109/tifs.2025.3645631
dc.identifier.issn1556-6013
dc.identifier.issn1556-6021
dc.identifier.urihttp://hdl.handle.net/10292/20442
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)
dc.relation.urihttps://ieeexplore.ieee.org/document/11305187
dc.rightsThis is the Author's Accepted Manuscript version of an article published in IEEE Transactions on Information Forensics and Security, the Version of Record can be found at DOI: 10.1109/tifs.2025.3645631
dc.rights.accessrightsOpenAccess
dc.subject08 Information and Computing Sciences
dc.subject09 Engineering
dc.subjectStrategic, Defence & Security Studies
dc.subject40 Engineering
dc.subject46 Information and computing sciences
dc.subjectSecret sharing
dc.subjectvisual cryptography scheme
dc.subjectsecret image sharing
dc.subjectaccess structure partition
dc.titleOptimal Access Structure Partition Methods for Image Secret Sharing
dc.typeJournal Article
pubs.elements-id749136

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Optimal_Access_Structure_Partition_Methods_for_Image_Secret_Sharing.pdf
Size:
31.58 MB
Format:
Adobe Portable Document Format
Description:
Author Accepted Manuscript

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.37 KB
Format:
Plain Text
Description: