Nothing Special   »   [go: up one dir, main page]

skip to main content
article

Secret image sharing with authentication-chaining and dynamic embedding

Published: 01 May 2011 Publication History

Abstract

Abstract: A popular technique to share a secret image among n participants is to divide it first into some shadow images and then embed the shadows in n''cover'' images. The resulting ''stego'' images, which contain the embedded data, are distributed among intended recipients. In order not to attract any attacker's attention, it is important to apply a suitable embedding such that high quality stego images are produced. Moreover, to ensure the integrity of stego data, a robust authentication mechanism which can detect tampering with high probability should be implemented. Recently, a series of papers (Lin and Tsai, 2004; Yang et al., 2007; Chang et al., 2008; Yang and Ciou, 2009) have considered polynomial-based secret image sharing with steganography and authentication. The embedding technique employed in all these papers is static, i.e. hidden bits are embedded in predetermined fixed-size blocks of each cover image. It is therefore possible that all the hidden data is replaced in only a subset of blocks of cover images while other blocks remain intact. As for authentication, the best of these schemes detects a tampered stego block with probability 15/16, however, since this is obtained at the cost of using 4 authentication bits per block, the visual quality of stego images is seriously degraded. In this paper, we propose a novel polynomial-based secret image sharing scheme with two achievements. First, a new embedding is proposed so that the block size is determined dynamically according to the size of hidden data and therefore, all the capacity of cover images is used for data hiding. Second, we introduce a new authentication-chaining method which achieves 15/16 as its tamper-detection ability while using only 2 authentication bits. Experimental results are provided to confirm the theory.

References

[1]
Safeguarding cryptographic keys. In: AFIPS Conference Proceedings, vol. 48, pp. 313-317.
[2]
Hiding data in images by simple lsb substitution. Pattern Recognition. v37. 474-496.
[3]
Image hiding scheme with modulus function and dynamic programming. Pattern Recognition. v39. 1155-1167.
[4]
Finding optimal least-significant-bits substitution in image hiding by dynamic programming strategy. Pattern Recognition. v36. 1583-2159.
[5]
Sharing secrets in stego images with authentication. Pattern Recognition. v41. 3130-3137.
[6]
Secret image sharing based on cellular automata and steganography. Pattern Recognition. v43. 397-404.
[7]
Visual secret sharing for multiple secrets. Pattern Recognition. v41. 3572-3581.
[8]
Visual cryptography for gray-level images by dithering techniques. Pattern Recognition Letters. v24. 349-358.
[9]
Secret image sharing with steganography and authentication. The Journal of Systems and Software. v73. 405-414.
[10]
Some extensions on threshold visual cryptography schemes. The Computer Journal. v53. 107-119.
[11]
A novel adaptive steganography based on local complexity and human vision sensitivity. Journal of Systems and Software. v83. 1236-1248.
[12]
Visual cryptography. In: Advances in Cryptology - EUROCRYPT'94 LNCS, vol. 950, pp. 1-12.
[13]
How to share a secret. Communication of the ACM. v22. 612-613.
[14]
Secret image sharing. Computer Graphics. v26 i5. 765-770.
[15]
An image-sharing method with user-friendly shadow images. IEEE Transactions on Circuits and Systems. 1161-1169.
[16]
A cheating prevention scheme for binary visual cryptography with homogeneous secret images. Pattern Recognition. v40. 2356-2366.
[17]
Xor-based visual cryptography schemes, Designs. Codes and Cryptography. v37. 169-186.
[18]
Image hiding by optimal lsb substitution and genetic algorithm. Pattern Recognition. v34. 671-683.
[19]
Data hiding: current status and key issues. International Journal of Network Security. v4. 1-9.
[20]
sharing and hiding secter images with size constraint. Pattern Recognition. v37. 1377-1385.
[21]
New visual secret sharing schemes using probabilistic method. Pattern Recognition Letters. v25. 481-494.
[22]
Reduce shadow size in aspect ratio invariant visual secret sharing schemes using a square block-wise operation. Pattern Recognition. v39. 1300-1314.
[23]
Extended visual secret sharing schemes: improving the shadow image quality. International Journal of Pattern Recognition and Artificial Intelligence. v21. 879-898.
[24]
Colored visual cryptography scheme based on additive color mixing. Pattern Recognition. v41. 3114-3129.
[25]
Improvements of image sharing with steganography and authentication. The Journal of Systems and Software. v80. 1070-1076.
[26]
A comment on "sharing secrets in stego images with authentication". Pattern Recognition. v42. 1615-1619.

Cited By

View all
  • (2023)Preserving friendly stacking and weighted shadows in selective scalable secret image sharingMultimedia Tools and Applications10.1007/s11042-023-14712-782:19(29283-29305)Online publication date: 22-Feb-2023
  • (2023)Genetic algorithm and hamilton path based data hiding scheme including embedding cost optimizationMultimedia Tools and Applications10.1007/s11042-022-14322-982:13(20233-20249)Online publication date: 13-Jan-2023
  • (2019)A novel verifiable and unconditionally secure m, t, n-threshold multi-secret sharing scheme using overdetermined systems of linear equations over finite Galois fieldsInternational Journal of Information and Computer Security10.5555/3302723.330272711:1(61-82)Online publication date: 1-Jan-2019
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Journal of Systems and Software
Journal of Systems and Software  Volume 84, Issue 5
May, 2011
175 pages

Publisher

Elsevier Science Inc.

United States

Publication History

Published: 01 May 2011

Author Tags

  1. Authentication
  2. Secret image sharing
  3. Steganography
  4. Visual quality

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 28 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Preserving friendly stacking and weighted shadows in selective scalable secret image sharingMultimedia Tools and Applications10.1007/s11042-023-14712-782:19(29283-29305)Online publication date: 22-Feb-2023
  • (2023)Genetic algorithm and hamilton path based data hiding scheme including embedding cost optimizationMultimedia Tools and Applications10.1007/s11042-022-14322-982:13(20233-20249)Online publication date: 13-Jan-2023
  • (2019)A novel verifiable and unconditionally secure m, t, n-threshold multi-secret sharing scheme using overdetermined systems of linear equations over finite Galois fieldsInternational Journal of Information and Computer Security10.5555/3302723.330272711:1(61-82)Online publication date: 1-Jan-2019
  • (2019)Embedded image coding using laplace transform for Turkish lettersMultimedia Tools and Applications10.1007/s11042-018-7096-978:13(17521-17534)Online publication date: 1-Jul-2019
  • (2019)A Novel Image Secret Sharing Scheme without Third-Party Scrambling MethodMobile Networks and Applications10.1007/s11036-018-1168-y24:4(1317-1335)Online publication date: 1-Aug-2019
  • (2018)A cellular automata-based multi-stage secret image sharing schemeMultimedia Tools and Applications10.5555/3270446.327057377:18(24073-24096)Online publication date: 1-Sep-2018
  • (2018)A New Gradual Secret Sharing Scheme with Diverse Access StructureWireless Personal Communications: An International Journal10.1007/s11277-017-5187-y99:3(1329-1344)Online publication date: 1-Apr-2018
  • (2018)Selective scalable secret image sharing with adaptive pixel-embedding techniqueMultimedia Tools and Applications10.1007/s11042-018-5908-677:20(27107-27121)Online publication date: 1-Oct-2018
  • (2018)A probabilistic image authentication method based on chaosMultimedia Tools and Applications10.1007/s11042-017-5569-x77:16(21463-21480)Online publication date: 1-Aug-2018
  • (2018)Secure data hiding scheme using shape generation algorithmMultimedia Tools and Applications10.1007/s11042-017-5200-177:13(16319-16345)Online publication date: 1-Jul-2018
  • Show More Cited By

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media