Document Type : Original/Review Paper


1 Computer department, Yazd University, Yazd, Iran.

2 Faculty of Science, Yazd University, Yazd, Iran.



In this paper, a novel scheme for lossless meaningful visual secret sharing using XOR properties is presented. In the first step, genetic algorithm with an appropriate proposed objective function created noisy share images. These images do not contain any information about the input secret image and the secret image is fully recovered by stacking them together. Because of attacks on image transmission, a new approach for construction of meaningful shares by the properties of XOR is proposed. In recovery scheme, the input secret image is fully recovered by an efficient XOR operation. The proposed method is evaluated using PSNR, MSE and BCR criteria. The experimental results presents good outcome compared with other methods in both quality of share images and recovered image.


Main Subjects

[1] H. Khodadadi and A. Zandvakili, “A New Method for Encryption of Color Images based on Combination of Chaotic Systems,” Journal of AI and Data Mining, Vol. 7, pp. 377–383, 2019.
[2] R. Sangeetha, G. Koteeswari, and M. Phil, “Securing Data in IOT using Cryptography and Steganography Techniques,” Int. J. Res. Eng. Sci., Vol.9, pp. 1–5, 2021.
[3] A. Shamir, “How to share a secret,” Communications of the ACM, Vol. 22, pp. 612–613, 1979.
[4] J.C. Ku-Cauich and G. Morales-Luna, “A linear code based on resilient Boolean maps whose dual is a platform for a robust secret sharing scheme,” Linear Algebra and its Applications, Vol. 596, pp. 216-229, 2020.
[5] C.C Thien and J.C Lin., “Secret image sharing,” Computer and Graphics, Vol. 26, pp. 765–770, 2020.
[6] R.Z. Wang and C.H Su, “Secret image sharing with smaller shadow images,” Pattern Recognition Letters, vol. 27, pp. 551–5, 2006.
[7] X. Jia, Y. Guo, X. Luo, D. Wang, and C. Zhang, “perfect secret sharing scheme for general access structures,” Information Sciences, Vol. 595, pp. 54-69, 2022.
[8] S. Charoghchi and S. Mashhadi, “Three (t, n)-secret image sharing schemes based on homogeneous linear recursion,” Information Sciences, Vol. 552, pp. 220-243, 2021.
[9] C.C Yang, T.Y Chang, M.S Hwang. A (t, n) multi-secret sharing scheme, “Applied Mathematics and Computation,” Vol.151, pp.483-490, 2004.
[10] M. Naor and A. Shamir, “Visual cryptography,” Workshop on the theory and application of cryptographic techniques, pp. 1–12, 1994.
[11] P. Singh, B. Raman, and M. Misra, “A (n, n) threshold non-expansible XOR based visual cryptography with unique meaningful shares,” Signal Processing, Vol. 142, pp. 301–319, 2018.
[12] M. Gupta and D. Chauhan, “A visual cryptographic scheme to secure image shares using digital watermarking,” International Journal of Computer Science and Information Technologies, vol. 6, pp. 4339–4343.
[13] C. Blundo and A. De Santis, “Visual cryptography schemes with perfect reconstruction of black pixels,” Computers & Graphics, Vol. 22, pp. 449-455, 1979.
[14] P.L. Chiu and K.H Lee, “A simulated annealing algorithm for general threshold visual cryptography schemes,” IEEE Transactions on Information Forensics and Security, Vol. 6, pp. 992–1001, 2011.
[15] O. Kafri and E. Keren, “Encryption of pictures and shapes by random grids,” Optics letters, Vol. 12, pp. 377–379,1987.
[16] T.H Chen and K.H Tsao, “Visual secret sharing by random grids revisited,” Pattern recognition, Vol. 42, pp. 2203–2217, 2009.
[17] X. Yan, X. Liu, and C.N Yang, “An enhanced threshold visual secret sharing based on random grids,” Journal of real-time image processing, Vol. 14, pp. 61-73, 2018.
[18] H.C Chao and T.Y Fan, “XOR-based progressive visual secret sharing using generalized random grids,” Displays, Vol. 49, pp. 6-15, 2017.
[19] S.J Shyu, “Image Encryption by Random Grids,” Pattern Recognition, Vol. 40, pp.1014-031, 2007.
[20] R.G. Sharma, P. Dimri, and H. Garg, “Visual cryptographic techniques for secret image sharing: a review,” Information Security Journal: A Global Perspectiv, Vol. 27, pp. 241–259, 2018.
[21] C.C. Chang, Y.H. Chen, and H.C. Wang, “Meaningful secret sharing technique with authentication and remedy abilities,” Information Sciences, Vol.181, pp. 3073-3084, 2011.
[22] P.L Chiu and K.H Lee. “Efficient constructions for progressive visual cryptography with meaningful shares,” Signal Processing, Vol. 165, pp. 233–249, 2019.
[23] D. Wang, L. Zhang, N. Ma, and X. Li, “Two secret sharing schemes based on Boolean operation,” Pattern Recognition, Vol. 40, pp. 2776–2785, 2007.
[24] D. Ou, W. Sun, and X. Wu, “Non-expansible XOR-based visual cryptography scheme with meaningful shares,” Signal Processing, Vol. 108, pp. 604–621, 2015.
[25] J. Mohan and R. Rajesh, “Secure visual cryptography scheme with meaningful shares,” Indian Journal of Computer Science and Engineering, Vol. 11, pp.146–160, 2020.
[26] Z. Wang, R.G. Arce, and G. Di Crescenzo. “Halftone visual cryptography via error diffusion,” IEEE transactions on information forensics and security, Vol. 4, pp. 383–396, 2009.
[27] M.E. Hodeish and V.T. Humbe, “An optimized halftone visual cryptography scheme using error diffusion,” Multimedia Tools and Applications, Vol. 19, pp. 24937–24953, 2018.
[28] S. Wang, Y. Lu, X. Yan, L. Li, and Y. Yu, “AMBTC-based visual secret sharing with different meaningful shadows,” Mathematical Biosciences and Engineering, Vol. 18, pp. 5236-5251, 2021.
[29] Y. Zhao and F.W.  Fu, “A cheating immune (k, n) visual cryptography scheme by using the rotation of shares,” Multimedia Tools and Application, Vol. 81, pp. 6235-6257, 2002.
[30] P.A. Eisen and D.R. Stinson, “Threshold visual cryptography schemes with specified whiteness levels of reconstructed pixels, Designs,” Codes and Cryptography, Vol. 25, pp. 15–61, 2002.
[31] G. Ateniese, C. Blundo, A. De Santis, and D.R. Stinson, “Visual cryptography for general access structures,” Information Computation, Vol. 129, pp. 86–106,1996.
[32] S. Kukreja, G. Kasana, and S.S Kasana. “Cellular automata based image authentication scheme using extended visual cryptography,” Computing and Informatics, Vol. 38, pp.1272–1300, 2019.
[33] L. Chandana Priya, K, “Praveen. (t, k, n). Deterministic extended visual secret sharing scheme using combined Boolean operations,” International Conference on Information Processing, Vol. 22, pp. 66-77, 2021.
[34] S. Shivani, “Multi-secret sharing with unexpanded meaningful shares,” Multimedia Tools and Applications, Vol. 77, pp. 6287–6310, 2018.
[35] S.P Kannojia and J. Kumar, “XOR-based visual secret sharing scheme using pixel vectorization,” Multimedia Tools and Applications, Vol. 80, pp. 14609–14635, 2021.
[36] L. Liu, Y. Lu, and X. Yan. “A novel (k1, k2, n)-threshold two-in-one secret image sharing scheme for multiple secrets,” Journal of Visual Communication and Image Representation, Vol. 1, pp. 102971, 2021.
[37] C.N. Yang and D.S. Wang, “Property analysis of XOR-based visual cryptography,” IEEE transactions on circuits and systems for video technology, Vol. 24(2), pp. 189-197, 2013.
[38] A. Nag, J.P. Singh, and A.K Singh, “An efficient Boolean based multi-secret image sharing scheme,” Multimedia tools and applications, Vol. 79, pp. 16219-16243, 2020.
[39] K. Bhat, U.K. Reddy KR, R. Kumar HS, and D. Mahto, “A novel scheme for lossless authenticated multiple secret images sharing using polynomials and extended visual cryptography,” IET Information Security, Vol. 15, pp. 13-22, 2021.
[40] S.S Lee, J.C. Na, S.W. Sohn, C. Park, D.H. Seo, and S.J. Ki, “Visual cryptography based on an interferometric encryption technique,” ETRI journal, Vol. 24, pp. 373-380, 2002.
[41] S. Kumar and R.K. Sharma, “Threshold visual secret sharing based on Boolean operations,” Security and Communication Networks, Vol. 7, pp. 653-664, 2014.
[42] T.Y. Fan and H.C. Chao, “User-friendly XOR-based visual secret sharing by random grid,” IET Information Security, Vol. 12, pp. 398-403, 2018.
[43] D. Taghaddos and A. Latif, “Visual cryptography for gray-scale images using bit-level,” Journal of Information Hiding and Multimedia Signal Processing, Vol. 5(1), pp. 90-97, 2014.
[44] P.D. Shah and R.S Bichkar, “Secret data modification based image steganography technique using genetic algorithm having a flexible chromosome structure,” Engineering Science and Technology, Vol. 24, pp. 782-794, 2021.