Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Secret image sharing with separate shadow authentication ability

Published: 01 March 2020 Publication History

Abstract

Secret image sharing (SIS) is attracting increasing attention due to its wide application to the distributed storage of digital images in a cloud and the importance of digital images. Shadow authentication plays an important role in the practical application of SIS. However, most SIS schemes with shadow authentication ability embed each shadow into a cover image using an existing information hiding technique, which leads to high generation and recovery (authentication) complexity and pixel expansion. In this paper, we propose an SIS scheme for a ( k, n ) threshold with a separate shadow authentication ability based on SIS itself rather than information hiding through applying visual secret sharing (VSS) to polynomial-based SIS by using a screening operation. The proposed scheme has low generation and recovery (authentication) complexity and no pixel expansion with a separate shadow authentication ability. In addition, it achieves lossless recovery without auxiliary encryption. We validate the proposed scheme by means of illustrations, theoretical analyses and comparisons.

Highlights

SIS with a separate shadow authentication ability is proposed.
The secret image is losslessly recovered without auxiliary encryption.
It has low recovery (authentication) complexity and no pixel expansion.

References

[1]
Naor M., Shamir A., Visual cryptography, in: Advances in Cryptology-EUROCRYPT’94 Lecture Notes in Computer Science, Workshop on the Theory and Application of Cryptographic Techniques, May 9-12, Springer, Perugia, Italy, 1995, pp. 1–12.
[2]
Wang G., Liu F., Yan W.Q., Basic visual cryptography using braille, Int. J. Digital Crime Forensics 8 (3) (2016) 85–93.
[3]
Shamir A., How to share a secret, Commun. ACM 22 (11) (1979) 612–613.
[4]
Asmuth C., Bloom J., A modular approach to key safeguarding, IEEE Trans. Inform. Theory 29 (2) (1983) 208–210.
[5]
Yan X., Lu Y., Liu L., Liu J., Yang G., Chinese remainder theorem-based two-in-one image secret sharing with three decoding options, Digit. Signal Process. 82 (2018) 80–90,. URL http://www.sciencedirect.com/science/article/pii/S1051200418305591.
[6]
Weir J., Yan W., A comprehensive study of visual cryptography, in: Transactions on DHMS V, in: LNCS, vol. 6010, Springer-Verlag, Berlin, Heidelberg, 2010, pp. 70–105.
[7]
Yan X., Wang S., Niu X., Threshold construction from specific cases in visual cryptography without the pixel expansion, Signal Process. 105 (2014) 389–398.
[8]
Wang Z., Arce G.R., Di Crescenzo G., Halftone visual cryptography via error diffusion, IEEE Trans. Inf. Forensics Secur. 4 (3) (2009) 383–396.
[9]
Yan X., Wang S., Niu X., Yang C.-N., Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality, Digit. Signal Process. 38 (2015) 53–65,.
[10]
Fu Z.-x., Yu B., Visual cryptography and random grids schemes, in: Digital-Forensics and Watermarking, Springer, Auckland, New Zealand, 2014, pp. 109–122.
[11]
Guo T., Liu F., Wu C., Threshold visual secret sharing by random grids with improved contrast, J. Syst. Softw. 86 (8) (2013) 2094–2109.
[12]
Yan X., Liu X., Yang C.-N., An enhanced threshold visual secret sharing based on random grids, J. Real-Time Image Process. 14 (1) (2018) 61–73.
[13]
Yan X., Lu Y., Progressive visual secret sharing for general access structure with multiple decryptions, Multimedia Tools Appl. 77 (2) (2018) 2653–2672.
[14]
Thien C.-C., Lin J.-C., Secret image sharing, Comput. Graphics 26 (5) (2002) 765–770.
[15]
Liu Y.-X., Yang C.-N., Wu C.-M., Sun Q.-D., Bi W., Threshold changeable secret image sharing scheme based on interpolation polynomial, Multimedia Tools Appl. 78 (13) (2019) 18653–18667,.
[16]
Yang C.-N., Ciou C.-B., Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability, Image Vis. Comput. 28 (12) (2010) 1600–1610.
[17]
Liu Y., Yang C., Wang Y., Zhu L., Ji W., Cheating identifiable secret sharing scheme using symmetric bivariate polynomial, Inform. Sci. 453 (2018) 21–29.
[18]
Zhou X., Lu Y., Yan X., Wang Y., Liu L., Lossless and efficient polynomial-based secret image sharing with reduced shadow size, Symmetry 10 (7) (2018),. URL http://www.mdpi.com/2073-8994/10/7/249.
[19]
Liu Y., Yang C., Scalable secret image sharing scheme with essential shadows, Signal Process., Image Commun. 58 (2017) 49–55.
[20]
P. Li, P. Ma, X. Su, Image secret sharing and hiding with authentication, in: 2010 First International Conference on Pervasive Computing, Signal Processing and Applications, 2010, pp. 367–370, https://doi.org/10.1109/PCSPA.2010.95.
[21]
Ulutas G., Ulutas M., Nabiyev V.V., Secret image sharing scheme with adaptive authentication strength, Pattern Recognit. Lett. 34 (3) (2013) 283–291,. URL http://www.sciencedirect.com/science/article/pii/S0167865512003479.
[22]
Lin C.-C., Tsai W.-H., Secret image sharing with steganography and authentication, J. Syst. Softw. 73 (3) (2004) 405–414,. URL http://www.sciencedirect.com/science/article/pii/S0164121203002395.
[23]
Chang C.-C., Hsieh Y.-P., Lin C.-H., Sharing secrets in stego images with authentication, Pattern Recognit. 41 (10) (2008) 3130–3137,. URL http://www.sciencedirect.com/science/article/pii/S0031320308001374.
[24]
Parvez M.T., Gutub A.A.-A., Vibrant color image steganography using channel differences and secret data distribution, Kuwait J. Sci. Eng. 38 (1B) (2011) 127–142.
[25]
Liu Y., Chang C.-C., A turtle shell-based visual secret sharing scheme with reversibility and authentication, Multimedia Tools Appl. 77 (19) (2018) 25295–25310,.
[26]
Gutub A., Alaseri K., Hiding shares of counting-based secret sharing via arabic text steganography for personal usage, Arab. J. Sci. Eng. (2019) 1–26.
[27]
Liu Y.-X., Sun Q.-D., Yang C.-N., (k,n) secret image sharing scheme capable of cheating detection, EURASIP J. Wireless Commun. Networking 2018 (1) (2018) 72,.
[28]
Yang C.-N., Wu C.-C., Wang D.-S., A discussion on the relationship between probabilistic visual cryptography and random grid, Inform. Sci. 278 (2014) 141–173.
[29]
De Prisco R., De Santis A., On the relation of random grid and deterministic visual cryptography, IEEE Trans. Inf. Forensics Secur. 9 (3–4) (2014) 653–665.
[30]
Kafri O., Keren E., Encryption of pictures and shapes by random grids, Opt. Lett. 12 (6) (1987) 377–379.
[31]
Ding W., Liu K., Yan X., Wang H., Liu L., Gong Q., An image secret sharing method based on matrix theory, Symmetry 10 (10) (2018) 530.

Cited By

View all
  • (2023)Security Analysis of Visual based Share Authentication and Algorithms for Invalid Shares Generation in Malicious ModelProceedings of the 2023 5th International Conference on Image Processing and Machine Vision10.1145/3582177.3582192(86-92)Online publication date: 13-Jan-2023
  • (2022)Fake and Dishonest Participant Immune Secret Image SharingACM Transactions on Multimedia Computing, Communications, and Applications10.1145/357284219:4(1-26)Online publication date: 24-Nov-2022
  • (2022)Double layer secure secret images sharing scheme for biometricsDistributed and Parallel Databases10.1007/s10619-021-07362-x40:4(861-885)Online publication date: 1-Dec-2022
  • Show More Cited By

Index Terms

  1. Secret image sharing with separate shadow authentication ability
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Please enable JavaScript to view thecomments powered by Disqus.

          Information & Contributors

          Information

          Published In

          cover image Image Communication
          Image Communication  Volume 82, Issue C
          Mar 2020
          214 pages

          Publisher

          Elsevier Science Inc.

          United States

          Publication History

          Published: 01 March 2020

          Author Tags

          1. Secret image sharing
          2. Shadow authentication
          3. Pixel expansion
          4. Lossless recovery

          Qualifiers

          • Research-article

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)0
          • Downloads (Last 6 weeks)0
          Reflects downloads up to 28 Feb 2025

          Other Metrics

          Citations

          Cited By

          View all
          • (2023)Security Analysis of Visual based Share Authentication and Algorithms for Invalid Shares Generation in Malicious ModelProceedings of the 2023 5th International Conference on Image Processing and Machine Vision10.1145/3582177.3582192(86-92)Online publication date: 13-Jan-2023
          • (2022)Fake and Dishonest Participant Immune Secret Image SharingACM Transactions on Multimedia Computing, Communications, and Applications10.1145/357284219:4(1-26)Online publication date: 24-Nov-2022
          • (2022)Double layer secure secret images sharing scheme for biometricsDistributed and Parallel Databases10.1007/s10619-021-07362-x40:4(861-885)Online publication date: 1-Dec-2022
          • (2021)Secret Image-Sharing Scheme Based on Multinode Authentication in the Internet of ThingsSecurity and Communication Networks10.1155/2021/17219252021Online publication date: 1-Jan-2021

          View Options

          View options

          Figures

          Tables

          Media

          Share

          Share

          Share this Publication link

          Share on social media