Fake and dishonest participant location scheme in secret image sharing

被引:5
作者
Liu, Jingju [1 ]
Sun, Lei [1 ]
Liu, Jinrui [1 ]
Yan, Xuehu [1 ]
机构
[1] Natl Univ Def Technol, Hefei 230037, Peoples R China
基金
中国国家自然科学基金;
关键词
secret image sharing; visual secret sharing; Chinese remainder theorem; shadow authentication; high-efficiency shadows generation; CHINESE REMAINDER THEOREM; STEGANOGRAPHY;
D O I
10.3934/mbe.2021126
中图分类号
Q [生物科学];
学科分类号
07 ; 0710 ; 09 ;
摘要
A (k, n) threshold secret image sharing (SIS) scheme divides a secret image into n shadows. One can reconstruct the secret image only when holding k or more than k shadows but cannot know any information on the secret from fewer than k shadows. Based on this characteristic, SIS has been widely used in access control, information hiding, distributed storage and other areas. Verifiable SIS aims to prevent malicious behaviour by attackers through verifying the authenticity of shadows and previous works did not solve this problem well. Our contribution is that we proposed a verifiable SIS scheme which combined CRT-based SIS and (2, n + 1) threshold visual secret sharing(VSS). Our scheme is applicable no matter whether there exists a third party dealer. And it is worth mentioning that when the dealer is involved, our scheme can not only detect fake participants, but also locate dishonest participants. In general, loose screening criterion and efficient encoding and decoding rate of CRTbased SIS guarantee high-efficiency shadows generation and low recovery computation complexity. The uncertainty of the bits used for screening prevents malicious behavior by dishonest participants. In addition, our scheme has the advantages of lossless recovery, no pixel expansion and precise detection.
引用
收藏
页码:2473 / 2495
页数:23
相关论文
共 35 条
[1]   Security enhancement of shares generation process for multimedia counting-based secret-sharing technique [J].
Al-Ghamdi, Maimoona ;
Al-Ghamdi, Manal ;
Gutub, Adnan .
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (12) :16283-16310
[2]  
Blakley GR, 1979, P AFIPS NEW YORK NY, P313, DOI DOI 10.1109/MARK.1979.8817296
[3]   Robust uncertainty principles:: Exact signal reconstruction from highly incomplete frequency information [J].
Candès, EJ ;
Romberg, J ;
Tao, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2006, 52 (02) :489-509
[4]   Sharing secrets in stego images with authentication [J].
Chang, Chin-Chen ;
Hsieh, Yi-Pei ;
Lin, Chia-Hsuan .
PATTERN RECOGNITION, 2008, 41 (10) :3130-3137
[5]  
Chor B., 1985, 26th Annual Symposium on Foundations of Computer Science (Cat. No.85CH2224-4), P383, DOI 10.1109/SFCS.1985.64
[6]   Compressed sensing [J].
Donoho, DL .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2006, 52 (04) :1289-1306
[7]  
Gutub A., 2020, MULTIMEDIA TOOLS APP, P1
[8]   Hiding Shares of Counting-Based Secret Sharing via Arabic Text Steganography for Personal Usage [J].
Gutub, Adnan ;
Alaseri, Khaled .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2020, 45 (04) :2433-2458
[9]   Image Based Steganography to Facilitate Improving Counting-Based Secret Sharing [J].
Gutub, Adnan ;
Al-Ghamdi, Maimoona .
3D RESEARCH, 2019, 10 (01)
[10]   Counting-based secret sharing technique for multimedia applications [J].
Gutub, Adnan ;
Al-Juaid, Nouf ;
Khan, Esam .
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (05) :5591-5619