Secret Image Sharing Scheme with Threshold Changeable Capability

被引:9
作者
Yuan, Lifeng [1 ,2 ]
Li, Mingchu [1 ,2 ]
Guo, Cheng [1 ,2 ]
Hu, Weitong [3 ]
Luo, Xinjian [1 ,2 ]
机构
[1] Dalian Univ Technol, Sch Software Technol, Dalian 116620, Peoples R China
[2] Key Lab Ubiquitous Network & Serv Software Liaoni, Dalian 116620, Peoples R China
[3] Hangzhou Dianzi Univ, Sch Comp & Technol, Hangzhou 310018, Zhejiang, Peoples R China
关键词
STEGANOGRAPHY;
D O I
10.1155/2016/9576074
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In secret image sharing schemes, the thresholdmay have to be adjusted in case of changes in the security policy and the adversary structure before recovering the secret image. For example, if participants leave the group, their stego images are useless to them andmay not be kept safely. As a result, these images can be easily stolen and utilized by intruders, which reduces the security of the scheme. To solve this problem, we propose a novel threshold changeable secret image sharing scheme with.. potential changeable thresholds t(1), t(2),...,...., t(N) By preparing advance shares for thresholds t(1), t(2),...,..t(N) and using the two-variable one-way function to generate the identification value, we can change the threshold when necessary. The experiments show that the quality of the stego images in our scheme is satisfactory and the secret image can be recovered without distortion. Moreover, the security analysis shows that we can change the threshold safely.
引用
收藏
页数:11
相关论文
共 28 条
  • [1] Updating the parameters of a threshold scheme by minimal broadcast
    Barwick, SG
    Jackson, WA
    Martin, KM
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2005, 51 (02) : 620 - 633
  • [2] Blakley B., 1993, Advances in Cryptology - CRYPTO '92. 12th Annual International Cryptology Conference Proceedings, P540
  • [3] Blakley GR, 1979, P NAT COMP C, P313, DOI 10.1109/MARK.1979.8817296
  • [4] Fully dynamic secret sharing schemes
    Blundo, C
    Cresti, A
    DeSantis, A
    Vaccaro, U
    [J]. THEORETICAL COMPUTER SCIENCE, 1996, 165 (02) : 407 - 440
  • [5] Sharing secrets in stego images with authentication
    Chang, Chin-Chen
    Hsieh, Yi-Pei
    Lin, Chia-Hsuan
    [J]. PATTERN RECOGNITION, 2008, 41 (10) : 3130 - 3137
  • [6] Chi-Sung Laih, 1991, Journal of Information Science and Engineering, V7, P13
  • [7] Chien HY, 2000, IEICE T FUND ELECTR, VE83A, P2762
  • [8] Desmedt Y., 1997, Technical Report ISSE TR-97-01
  • [9] Gollmann D., 1996, P 1996 CAMBRIDGE WOR, P139
  • [10] A multi-threshold secret image sharing scheme based on MSP
    Guo, Cheng
    Chang, Chin-Chen
    Qin, Chuan
    [J]. PATTERN RECOGNITION LETTERS, 2012, 33 (12) : 1594 - 1600