Loading [Contrib]/a11y/accessibility-menu.js
Research article Special Issues

A compressed secret image sharing method with shadow image verification capability

  • Received: 22 April 2020 Accepted: 15 June 2020 Published: 18 June 2020
  • Secret image sharing (SIS) is an important research direction in information hiding and data security transmission. Since the generated shadow images (shares) are always noise-like, it is difficult to distinguish the fake share from the unauthorized participant before recovery. Even more serious is that an attacker with a fake share can easily collect shares of other honest participants. As a result, it is significant to verify the shares, before being taken out for recovery. Based on two mainstream methods of SIS, such as polynomial-based SIS and visual secret sharing(VSS), this paper proposed a novel compressed SIS with the ability of shadow image verification. Considering that the randomness of the sharing phase of polynomial-based SIS can be utilized, one out of shares of (2, 2)-threshold random-grid VSS is embedded into all shares of polynomial-based SIS by a XOR operation as the verification information, while the other binary share is private for verification. Before recovery, each participant must extract the binary share from the grayscale share to perform XOR operation with the private share, and the original binary image can be recovered only with the true share. The proposed scheme also has the characteristics of shadow image verification, pixel compression, loss tolerance and lossless recovery. Through experiments and comparative analysis of related research results, the effectiveness and advantages of the method are verified.

    Citation: Guozheng Yang, Lintao Liu, Xuehu Yan. A compressed secret image sharing method with shadow image verification capability[J]. Mathematical Biosciences and Engineering, 2020, 17(4): 4295-4316. doi: 10.3934/mbe.2020237

    Related Papers:

    [1] Okan Bulut, Cheryl N. Poth . Rapid assessment of communication consistency: sentiment analysis of public health briefings during the COVID-19 pandemic. AIMS Public Health, 2022, 9(2): 293-306. doi: 10.3934/publichealth.2022020
    [2] Gareth Morgan . Does Utilitarian Policy such as Smoking Cessation Lend Support to Wider Aspirin Use?. AIMS Public Health, 2015, 2(2): 223-226. doi: 10.3934/publichealth.2015.2.223
    [3] Bethany M. Kwan, Aimee B. Valeras, Shandra Brown Levey, Donald E. Nease, Mary E. Talen . An Evidence Roadmap for Implementation of Integrated Behavioral Health under the Affordable Care Act. AIMS Public Health, 2015, 2(4): 691-717. doi: 10.3934/publichealth.2015.4.691
    [4] Andrea M. Auxier, Bonni D. Hopkins, Anne E. Reins . Under Construction: One States Approach to Creating Health Homes for Individuals with Serious Mental Illness. AIMS Public Health, 2015, 2(2): 163-182. doi: 10.3934/publichealth.2015.2.163
    [5] Bernadette M. Pauly, Sana Z. Shahram, Phuc T. H. Dang, Lenora Marcellus, Marjorie MacDonald . Health Equity Talk: Understandings of Health Equity among Health Leaders. AIMS Public Health, 2017, 4(5): 490-512. doi: 10.3934/publichealth.2017.5.490
    [6] LacreishaEjike-King, RashidaDorsey . Reducing Ex-offender Health Disparities through the Affordable Care Act: Fostering Improved Health Care Access and Linkages to Integrated Care. AIMS Public Health, 2014, 1(2): 76-83. doi: 10.3934/publichealth.2014.2.76
    [7] Abdulqadir J. Nashwan, Rejo G. Mathew, Reni Anil, Nabeel F. Allobaney, Sindhumole Krishnan Nair, Ahmed S. Mohamed, Ahmad A. Abujaber, Abbas Balouchi, Evangelos C. Fradelos . The safety, health, and well-being of healthcare workers during COVID-19: A scoping review. AIMS Public Health, 2023, 10(3): 593-609. doi: 10.3934/publichealth.2023042
    [8] Helen Mary Haines, Opie Cynthia, David Pierce, Lisa Bourke . Notwithstanding High Prevalence of Overweight and Obesity, Smoking Remains the Most Important Factor in Poor Self-rated Health and Hospital Use in an Australian Regional Community. AIMS Public Health, 2017, 4(4): 402-417. doi: 10.3934/publichealth.2017.4.402
    [9] Allison B. Reiss, Donna de Levante Raphael, Nathaniel A. Chin, Vivek Sinha . The physician's Alzheimer's disease management guide: Early detection and diagnosis of cognitive impairment, Alzheimer's disease and related dementia. AIMS Public Health, 2022, 9(4): 661-689. doi: 10.3934/publichealth.2022047
    [10] Elham Hatef, Zachary Predmore, Elyse C. Lasser, Hadi Kharrazi, Karin Nelson, Idamay Curtis, Stephan Fihn, Jonathan P. Weiner . Integrating social and behavioral determinants of health into patient care and population health at Veterans Health Administration: a conceptual framework and an assessment of available individual and population level data sources and evidence-based measurements. AIMS Public Health, 2019, 6(3): 209-224. doi: 10.3934/publichealth.2019.3.209
  • Secret image sharing (SIS) is an important research direction in information hiding and data security transmission. Since the generated shadow images (shares) are always noise-like, it is difficult to distinguish the fake share from the unauthorized participant before recovery. Even more serious is that an attacker with a fake share can easily collect shares of other honest participants. As a result, it is significant to verify the shares, before being taken out for recovery. Based on two mainstream methods of SIS, such as polynomial-based SIS and visual secret sharing(VSS), this paper proposed a novel compressed SIS with the ability of shadow image verification. Considering that the randomness of the sharing phase of polynomial-based SIS can be utilized, one out of shares of (2, 2)-threshold random-grid VSS is embedded into all shares of polynomial-based SIS by a XOR operation as the verification information, while the other binary share is private for verification. Before recovery, each participant must extract the binary share from the grayscale share to perform XOR operation with the private share, and the original binary image can be recovered only with the true share. The proposed scheme also has the characteristics of shadow image verification, pixel compression, loss tolerance and lossless recovery. Through experiments and comparative analysis of related research results, the effectiveness and advantages of the method are verified.



    Health information technology (HIT) refers to the comprehensive management of health information across computerized systems and its secure exchange between patients, health care providers, government, and others [1],[2].

    A broad and consistent use of HIT can potentially improve the quality of primary health care, reduce medical errors, reduce basic health care costs, decrease paperwork, increase administrative efficiency, and expand access to affordable care. The World Health Organization has identified HIT as a tool with which to address health problems and transform quality of life [3].

    India is a hub of IT-enabled service industries. Despite this tremendous potential, there is limited use of HIT in the public health sector as compared with other sectors such as banking, railway, tourism, and entertainment, which have embraced IT on a considerable scale [1].

    According to the technology acceptance model [4], the speed of acceptance and dissemination of a particular technology depends primarily on its perceived usefulness and ease of use (Figure 1). England et al. [5] conducted a study which revealed that the complexity of health care organizations and their fragmented internal structure constrained their ability to adopt organization-wide IT. The authors concluded that both organizational and technological factors lead to the slow adoption of strategic IT.

    Figure 1.  Technology acceptance model [4].

    Another important contributing factor to the limited use of IT in health care is the comparatively less revenue generation in the public health sector. For most governments, primary health care is an investment with no immediate return though there are obvious long-term benefits. Such myopic perception at the policy level may function as a barrier to the adoption of any technology [6].

    Other reasons of low use of technology in health sector include language barriers, use of outdated technology, and lackluster appeal for the general public [1].

    With use of the smart phones by general public increasing day by day, an important way of use of HIT is popularization of emojis, images, and icons are pictorial methods of expression as health-related communication.

    India is now considered a major mobile technology consumer [7], and communication through mobile phones is no longer limited to text messages. We communicate more with each other using emojis, images, and icons in chats or on social media.

    The inclination toward this pictorial mode of expression is quite natural. If we consider paleo-anthropology and the history of linguistic development, we can clearly see that Homo Sapiens have always used symbolic languages and wall paintings to communicate with each other (Figure 2). Even the earliest traces of language, dating back to the age of the caveman and woman, were also strikingly similar to icons, paintings, and symbols. These are still observed in tribal hamlets. The symbol/icon is thus a connecting link between our past and the present.

    Figure 2.  Similarity in symbolic communication earlier and now (Source-https://www.freepik.com/free-photos-vectors/design).

    Emojis, images, and icons help break the barriers of languages. Meanings of symbols are easily understood across the globe. Furthermore, images tend to have more appeal than text. As the saying indicates, “A picture speaks more than a thousand words.” Interestingly, the written language (script) of some Asian countries (e.g., China, Korea, and Japan) are symbol-based. Apart from being linked with human emotions, Emojis, images, and icons can also be developed or tailor-made to appeal to the cultural norms prevalent in a society. One cannot ignore the strong influence of culture [6].

    In Japan, a study was conducted on the use of graphic symbols to improve communication. Initially, graphic symbols were developed to correspond to 26 basic disease symptoms. It was observed that out of 26 symbols, 10 symbols showed > 90% matching rates for all groups. These symbols were considered to be effective alternatives to verbal communication [8].

    We often use symbols in charts and pictures in primary health/public health during dietary assessment and in growth monitoring of children under 5 years of age. Symbols are also used in hospitals in the treatment of children with learning disorders, such as autism, dyslexia, and attention deficit hyperactivity disorder [8].

    In patients receiving palliative care, or patients who cannot communicate, symbols are highly useful in the assessment of daily needs such as when the patient needs to take a drink, needs a toilet pan, or does not like a bitter medication [8][9].

    Mobile phone technology is extensively used by the government to send primary health care-related information in the form of short message service messages (e.g. polio prevention). However, if the person/patient/target audience is illiterate or does not know the language in which these are sent, the entire exercise becomes fruitless. The practical significance of this method is, in effect, nullified by the language barrier.

    Migration to different places for better employment and civic facilities is a natural consequence of the trend of rapid urbanization and socioeconomic transition that India is currently witnessing.

    Consider, for example, a case where a person from Bengal province (who does not know the Punjabi language) is settled or working in Punjab province owing to various factors and is using a mobile SIM from Punjab. None of the public health/primary health care messages sent in the Punjabi language on a regular basis to the person through his or her mobile phone are understood. Though the health department provides health information through traditional methods (e.g. face-to-face communication, pamphlets, leaflets, banners), these methods are not always effective, especially in hard-to-reach areas or areas with significant cultural or regional differences [1].

    According to the Linguistic Survey of India, the country has a total of 179 languages and 544 dialects. Health communication is a big challenge for primary health care workers, especially in hard-to-reach/tribal areas [10]. Previous studies have found that owing to communication barriers, tribal patients in India still prefer home delivery by untrained dais (women, who can conduct deliveries in their community), despite all efforts for institutional delivery by the government. The decisions of Jan gurus (local priests) regarding day-to-day health problems are final, which often bypasses primary/rural health care [11][16]. Clearly, cultural appropriateness is an indispensable quality of effective health care message delivery. In a country such as India, which is highly diverse, a deeper understanding of the rural community is important for effective public health message delivery [17].

    Furthermore, an enormous amount of money is spent on printing leaflets, banners, sending short message services in different languages, etc. Yet the outcome assessment may not give very encouraging figures. Therefore, it is necessary to find alternative methods of providing health information.

    Thus, a different strategy is required. The blanket approaches mentioned above [1] do not suffice. To make these efforts productive and rewarding, health messages should be delivered using a universal format understood by all recipients. These messages should also have better appeal and should capture the attention of the target audience.

    We, therefore, propose that health messages may also be delivered through emojis, icons, and pictorial messages in addition to the traditional methods through smart phones. Smartphones can be employed in many ways in the delivery of health care services. For example, smartphones can be used to enhance the flow of information between primary health care providers and the general public, which in turn would provide more opportunities for health promotion and obtaining feedback.

    India is a diverse country with striking differences in culture, norms, and beliefs. In the 21st century, smart phone technology is increasingly used as a one-step solution for many of the problems of daily life. Emoji-based/symbolic health messages should be employed in primary health care. The World Health Organization recently began using emoji-based health messages for Tuberculosis patients (Figure 3). Most importantly, culture-specific icons/symbols need to be devised that may appeal to all, irrespective of language barriers, since these are related to our roots [1].

    As various contextual factors contribute to symbol comprehension, more attention should be paid to describing the design of emojis, as well as considerations for developing them. There is also a need for symbols to be tested prior to use. These graphical symbols to be vetted prior to use applying the International Standard Organization's test method for comprehension.

    In this way, effective health communication related to primary health can be made more easily available and palatable to the target/rural/marginalized/tribal population with good and sustained impact and at low cost.

    Figure 3.  WHO is using symbols for delivering health message (Source-https://twitter.com/WHOPhilippines).


    [1] A. Shamir, How to share a secret, Commun. ACM, 22 (1979), 612-613.
    [2] M. Naor, A. Shamir, Visual cryptography, in Workshop on the Theory and Application of of Cryptographic Techniques, Springer, 1994, 1-12.
    [3] C. C. Thien, J. C. Lin, Secret image sharing, Comput. Graphics, 26 (2002), 765-770.
    [4] X. Yan, Y. Lu, L. Liu, X. Song, Reversible image secret sharing, IEEE Trans. Inf. Forens., Early Access.
    [5] Y. Liu, C. Yang, Scalable secret image sharing scheme with essential shadows, Signal Process. Image Commun., 58 (2017), 49-55. doi: 10.1016/j.image.2017.06.011
    [6] G. Wang, F. Liu, W. Q. Yan, Basic visual cryptography using braille, Int. J. Digital Crime Forens., 8 (2016), 85-93. doi: 10.4018/IJDCF.2016070106
    [7] X. Yan, Y. Lu, L. Liu, J. Liu, G. Yang, Chinese remainder theorem-based two-in-one image secret sharing with three decoding options, Digital Signal Process., 82 (2018), 80-90. doi: 10.1016/j.dsp.2018.07.015
    [8] R. De Prisco, A. De Santis, On the relation of random grid and deterministic visual cryptography, IEEE Trans. Inf. Forens., 9 (2014), 653-665. doi: 10.1109/TIFS.2014.2305574
    [9] C.-N. Yang, C.-C. Wu, D.-S. Wang, A discussion on the relationship between probabilistic visual cryptography and random grid, Inf. Sci., 278 (2014), 141-173. doi: 10.1016/j.ins.2014.03.033
    [10] T.-H. Chen, K.-H. Tsao, User-friendly random-grid-based visual secret sharing, IEEE Trans. Circuits Syst. Video Technol., 21 (2011), 1693-1703. doi: 10.1109/TCSVT.2011.2133470
    [11] M. Tompa, H. Woll, How to share a secret with cheaters, J. Cryptol., 1 (1989), 133-138.
    [12] P. Li, P. Ma, X. Su, Image secret sharing and hiding with authentication, in 2010 First International Conference on Pervasive Computing, Signal Processing and Applications, IEEE, 2010,367-370.
    [13] C.-C. Chang, Y.-P. Hsieh, C.-H. Lin, Sharing secrets in stego images with authentication, Pattern Recognit., 41 (2008), 3130-3137. doi: 10.1016/j.patcog.2008.04.006
    [14] Y. Liu, C.-C. Chang, A turtle shell-based visual secret sharing scheme with reversibility and authentication, Multimed. Tools. Appl., 77 (2018), 25295-25310. doi: 10.1007/s11042-017-5327-0
    [15] Y.-X. Liu, Q.-D. Sun, C.-N. Yang, (k, n) secret image sharing scheme capable of cheating detection, EURASIP J. Wirel. Commun. Netw., 2018 (2018), 72.
    [16] X. Yan, Q. Gong, L. Li, G. Yang, Y. Lu, J. Liu, Secret image sharing with separate shadow authentication ability, Signal Process. Image Commun., 82 (2020), 115721.
    [17] X. Wu, W. Sun, Random grid-based visual secret sharing with abilities of or and xor decryptions, J. Visual Communi. Image Represent., 24 (2013), 48-62. doi: 10.1016/j.jvcir.2012.11.001
    [18] X. Yan, S. Wang, X. Niu, C.-N. Yang, Random grid-based visual secret sharing with multiple decryptions, J. Visual Communi. Image Represent., 26 (2015), 94-104. doi: 10.1016/j.jvcir.2014.11.003
    [19] X. Yan, Y. Lu, Progressive visual secret sharing for general access structure with multiple decryptions, Multimed. Tools. Appl., 77 (2018), 2653-2672. doi: 10.1007/s11042-017-4421-7
  • This article has been cited by:

    1. Shaimaa Abdel-Aziz, Yasmine Samir Galal, Salah Hassan Al Hanafy, Mohamed Ghamrawy, Dina Samy Mohamed Shaheen, Digital Storytelling: A Video-based Approach for Engaging University Students in Health Education, 2022, 10, 1857-9655, 33, 10.3889/oamjms.2022.7382
  • Reader Comments
  • © 2020 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(4464) PDF downloads(200) Cited by(2)

Figures and Tables

Figures(8)  /  Tables(2)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog