Integrating Visual Cryptography for Efficient and Secure Image Sharing on Social Networks
Abstract
:1. Introduction
- The introduction of a secret-sharing-based data forwarding and sharing model, which facilitates the real-time transmission of vast amounts of sensitive data from IoT terminals.
- The proposal of a downsampling-based non-expansive VCS to reduce encrypted image size and preserve decryption quality.
- The conducting of comprehensive experiments on classic test images demonstrates that our proposed framework achieves comparable recognition performance on encrypted datasets to that on plain datasets.
2. Background and Related Works
2.1. Background
2.2. Related Works
3. Proposed Method
3.1. Pregeneration of Encrypted Images
3.2. Pixel Expansion Elimination
Algorithm 1: The integrated visual cryptography for efficient and secure image sharing. |
4. Experimental Results
4.1. Experiment Setup
4.2. Experiment Results
4.3. Security Analysis
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Chen, J.; Wang, Y.; Yan, X.; Wang, J.; Li, L. Visual secret sharing scheme with (n,n) threshold based on WeChat Mini Program codes. J. Vis. Commun. Image Represent. 2022, 82, 103409. [Google Scholar] [CrossRef]
- Yang, Y.; Xiao, X.; Cai, X.; Zhang, W. A Secure and Privacy-Preserving Technique Based on Contrast-Enhancement Reversible Data Hiding and Plaintext Encryption for Medical Images. IEEE Signal Process. Lett. 2020, 27, 256–260. [Google Scholar] [CrossRef]
- Wen, W.; Fan, J.; Zhang, Y.; Fang, Y. APCAS: Autonomous Privacy Control and Authentication Sharing in Social Networks. IEEE Trans. Comput. Soc. Syst. 2022, 10, 3169–3180. [Google Scholar] [CrossRef]
- Wu, X.; Fang, J.; Yan, W. Contrast Optimization for Size Invariant Visual Cryptography Scheme. IEEE Trans. Image Process. 2023, 32, 2174–2189. [Google Scholar] [CrossRef] [PubMed]
- Gu, Z.; Li, H.; Khan, S.; Deng, L.; Du, X.; Guizani, M.; Tian, Z. IEPSBP: A Cost-Efficient Image Encryption Algorithm Based on Parallel Chaotic System for Green IoT. IEEE Trans. Green Commun. Netw. 2022, 6, 89–106. [Google Scholar] [CrossRef]
- Khan, R.; Kumar, P.; Jayakody, D.N.K.; Liyanage, M. A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions. IEEE Commun. Surv. Tutorials 2020, 22, 196–248. [Google Scholar] [CrossRef]
- Wu, X.; Yang, C.N. Probabilistic color visual cryptography schemes for black and white secret images. J. Vis. Commun. Image Represent. 2020, 70, 102793. [Google Scholar] [CrossRef]
- Ren, L.; Zhang, D. A QR code-based user-friendly visual cryptography scheme. Sci. Rep. 2022, 12, 7667. [Google Scholar] [CrossRef] [PubMed]
- Yan, B.; Xiang, Y.; Hua, G. Improving the Visual Quality of Size-Invariant Visual Cryptography for Grayscale Images: An Analysis-by-Synthesis (AbS) Approach. IEEE Trans. Image Process. 2019, 28, 896–911. [Google Scholar] [CrossRef] [PubMed]
- Zhang, D.; Shafiq, M.; Srivastava, G.; Gadekallu, T.R.; Wang, L.; Gu, Z. STBCIoT: Securing the Transmission of Biometric Images in Customer IoT. IEEE Internet Things J. 2024, 11, 16279–16288. [Google Scholar] [CrossRef]
- Naor, M.; Shamir, A. Visual cryptography. In Advances in Cryptology—EUROCRYPT’94; De Santis, A., Ed.; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 1995; Volume 950, pp. 1–12. [Google Scholar] [CrossRef]
- Said, G.; Ghani, A.; Ullah, A.; Azeem, M.; Bilal, M.; Kwak, K.S. Light-Weight Secure Aggregated Data Sharing in IoT-Enabled Wireless Sensor Networks. IEEE Access 2022, 10, 33571–33585. [Google Scholar] [CrossRef]
- Talebi, H.; Milanfar, P. Learning to Resize Images for Computer Vision Tasks. In Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision (ICCV), Los Alamitos, CA, USA, 10–17 October 2021; pp. 487–496. [Google Scholar] [CrossRef]
- Melkemi, M.; Hammoudi, K. Voronoi-based image representation applied to binary visual cryptography. Signal Process. Image Commun. 2020, 87, 115913. [Google Scholar] [CrossRef]
- Denghui, Z.; Hongbin, Z.; Shenglong, L.; Xu, W. HP-VCS: A high-quality and printer-friendly visual cryptography scheme. J. Vis. Commun. Image Represent. 2021, 78, 103–186. [Google Scholar] [CrossRef]
- Wu, X.; Luo, Z. Block-based progressive visual cryptography scheme with uniform progressive recovery and consistent background. J. Vis. Commun. Image Represent. 2022, 88, 103631. [Google Scholar] [CrossRef]
- Zhang, D.; Ren, L.; Shafiq, M.; Gu, Z. A Lightweight Privacy-Preserving System for the Security of Remote Sensing Images on IoT. Remote Sens. 2022, 14, 6371. [Google Scholar] [CrossRef]
- Ostromoukhov, V. A simple and efficient error-diffusion algorithm. In Proceedings of the SIGGRAPH ’01: 28th Annual Conference on Computer Graphics and Interactive Techniques, Los Angeles, CA, USA, 12–17 August 2001; Association for Computing Machinery: New York, NY, USA, 2001; pp. 567–572. [Google Scholar] [CrossRef]
- Son, C.H. Inverse halftoning through structure-aware deep convolutional neural networks. Signal Process. 2020, 173, 107591. [Google Scholar] [CrossRef]
- Wu, X.; Wong, D.S.; Li, Q. Threshold Visual Cryptography Scheme for Color Images with No Pixel Expansion. In Proceedings of the Second Symposium International Computer Science and Computation Technology, Huangshan, China, 26–28 December 2009. [Google Scholar]
- Zhou, Z.; Arce, G.R.; Di Crescenzo, G. Halftone visual cryptography. IEEE Trans. Image Process. 2006, 15, 2441–2453. [Google Scholar] [CrossRef] [PubMed]
Test Images ↓ | Metrics → | PSNR | SSIM | NAE |
---|---|---|---|---|
Baboon | ED | 20.52 | 0.83 | 0.36 |
probabilistic | 13.06 | 0.47 | 0.58 | |
Our | 19.69 | 0.69 | 0.39 | |
random-grid | 10.67 | 0.56 | 0.64 | |
Barbara | ED | 21.41 | 0.83 | 0.36 |
probabilistic | 12.79 | 0.44 | 0.62 | |
Our | 20.54 | 0.72 | 0.40 | |
random-grid | 11.24 | 0.52 | 0.65 | |
Boats | ED | 20.25 | 0.82 | 0.36 |
probabilistic | 13.09 | 0.45 | 0.58 | |
Our | 19.28 | 0.7 | 0.39 | |
random-grid | 10.91 | 0.56 | 0.63 | |
Butterfly | ED | 20.83 | 0.83 | 0.36 |
probabilistic | 12.93 | 0.48 | 0.6 | |
Our | 19.99 | 0.74 | 0.39 | |
random-grid | 12.15 | 0.6 | 0.61 | |
Peppers | ED | 20.68 | 0.83 | 0.36 |
probabilistic | 12.96 | 0.44 | 0.6 | |
Our | 20.00 | 0.72 | 0.39 | |
random-grid | 11.51 | 0.55 | 0.63 | |
House | ED | 19.72 | 0.83 | 0.36 |
probabilistic | 13.08 | 0.48 | 0.56 | |
Our | 18.87 | 0.68 | 0.39 | |
random-grid | 10.83 | 0.58 | 0.62 | |
Airplane | ED | 17.82 | 0.81 | 0.36 |
probabilistic | 13.62 | 0.53 | 0.48 | |
Our | 17.24 | 0.65 | 0.38 | |
random-grid | 11.92 | 0.69 | 0.52 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Ren, L.; Zhang, D. Integrating Visual Cryptography for Efficient and Secure Image Sharing on Social Networks. Appl. Sci. 2025, 15, 4150. https://doi.org/10.3390/app15084150
Ren L, Zhang D. Integrating Visual Cryptography for Efficient and Secure Image Sharing on Social Networks. Applied Sciences. 2025; 15(8):4150. https://doi.org/10.3390/app15084150
Chicago/Turabian StyleRen, Lijing, and Denghui Zhang. 2025. "Integrating Visual Cryptography for Efficient and Secure Image Sharing on Social Networks" Applied Sciences 15, no. 8: 4150. https://doi.org/10.3390/app15084150
APA StyleRen, L., & Zhang, D. (2025). Integrating Visual Cryptography for Efficient and Secure Image Sharing on Social Networks. Applied Sciences, 15(8), 4150. https://doi.org/10.3390/app15084150