Article Preview
TopIntroduction
Nowadays, the wide use of media data such as digital images or videos attracts the attention to the security issues. In the past few years, various cryptographic schemes have been proposed as possible solutions to the security of digital images. Cryptography provides a very powerful method to protect both confidentiality and robustness. Traditional cryptographic algorithms (Li et al., 2012; Li et al., 2007; Torrubia & Mora, 2002; Yang et al., 2009) can be directly applied to protect the images, audios and videos in these applications. But these schemes are not loss-tolerant, and need a great lot of calculation. At the meanwhile, users need to pay attention on the security of the key used for encryption.
Secret sharing techniques are able to solve these issues above, which are the natural drawbacks of the traditional cryptography. Secret sharing (SS) was first proposed by Blakley (1979) and Shamir (1979) independently. In the encryption process, it splits the secret image into noise-like shadow images (also called shares or shadows), and then distributes them among the authorized participants. When collecting sufficient shadow images, authorized participants can recover the secret. This technique has value of better theoretical and practical research.
Visual secret sharing (VSS) and Shamir's polynomial-based scheme are mainstreams of secret sharing. Except for simple recovery and alternative order of the shadow images, the traditional VSS and random grids-based VSS (RGVSS) (Chen & Tsao, 2011; Kafri & Keren, 1987; Shyu, 2007) can realize many other good properties, such as no pixel expansion, meaningful shares and so on. Since they are designed only for the binary images, it still has a long way to be applied in encryption for the grayscale image. In addition, their recovered secret images are usually lossy. At the same time, some other schemes based on Shamir's polynomial and Lagrange interpolation, have been proposed (Thien & Lin, 2003; Zhao et al., 2009) to realize the secret image sharing. These schemes have the advantages of
threshold, lossless recovery and less pixel expansion. However, they suffer from ``All-or-Nothing”, complex recovery and known order of the shadow images.
Along with the development of many business applications like pay-per-view videos, Pay-TV/Music, artwork image vending, and video on demand (VOD), the following feature namely “progressive or perceptual property” is more and more valuable (Yan et al., 2014). This feature requires that the visual quality of media data could be controlled by a control factor, which can be determined by the senders. Progressive property makes it possible for potential users to view low-quality copies of the media data products before buying them. By controlling the number of shares sent to users, secret sharing scheme with special construction may effectively achieve the goal of visual quality control.
Currently, progressive visual secret sharing (PVSS) schemes based on VCS (Hou & Quan, 2011; Hou & Quan, 2013; Chen, 2009), Shamir's polynomial (Chen & Lin, 2005) or transformation (Huang et al., 2010) have the progressive or perceptual property. Progressive property means better perceptual quality will be gained when more shadow images are collected. However, they overall suffer from the same disadvantages as VCS, RG and Shamir's polynomial-based secret sharing.