A Common Method of Share Authentication in Image Secret Sharing

被引:46
|
作者
Yan, Xuehu [1 ]
Lu, Yuliang [1 ]
Yang, Ching-Nung [2 ]
Zhang, Xinpeng [3 ]
Wang, Shudong [1 ]
机构
[1] Natl Univ Def Technol, Coll Elect Engn, Hefei 230037, Peoples R China
[2] Natl Dong Hwa Univ, Dept Comp Sci & Informat Engn, Hualien 974, Taiwan
[3] Fudan Univ, Sch Comp Sci, Shanghai 200433, Peoples R China
基金
中国国家自然科学基金;
关键词
Image secret sharing; lossless recovery; share authentication; no pixel expansion; VISUAL CRYPTOGRAPHY; SCHEME; ROBUST; STEGANOGRAPHY;
D O I
10.1109/TCSVT.2020.3025527
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Because of the importance of digital images and their extensive application to digital watermarking, block chain, access control, identity authentication, distributive storage in the cloud and so on, image secret sharing (ISS) is attracting ever-increasing attention. Share authentication is an important issue in its practical application. However, most ISS schemes with share authentication ability require a dealer to participate in the authentication (namely, dealer participatory authentication). In this paper, we design an ISS for a (k, n)-threshold with separate share authentication abilities of both dealer participatory authentication and dealer nonparticipatory authentication. The advantages of polynomial-based ISS and visual secret sharing (VSS) are skillfully fused to achieve these two authentication abilities without sending a share by using a screening operation. In addition, the designed scheme has the characteristics of low decryption (authentication) complexity, lossless decryption and no pixel expansion. Experiments and theoretical analyses are performed to show the effectiveness of the designed scheme.
引用
收藏
页码:2896 / 2908
页数:13
相关论文
共 50 条
  • [1] Secret image sharing with steganography and authentication
    Lin, CC
    Tsai, WH
    JOURNAL OF SYSTEMS AND SOFTWARE, 2004, 73 (03) : 405 - 414
  • [2] An Improvement of Image Secret Sharing and Hiding With Authentication
    Aghaziarati, S.
    Saryazdi, S.
    Nezamabadipour, H.
    2012 9TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2012, : 38 - 42
  • [3] Improved Secret Image Sharing Method By Encoding Shared Values With Authentication Bits
    Ulutas, Guzin
    Ulutas, Mustafa
    Nabiyev, Vasif
    COMPUTER AND INFORMATION SCIENCES II, 2012, : 331 - 335
  • [4] Secret image sharing with capability of share data reduction
    Lin, CC
    Tsai, WH
    OPTICAL ENGINEERING, 2003, 42 (08) : 2340 - 2345
  • [5] An image secret sharing method
    Bai, Li
    Biswas, Saroj
    Ortiz, Albert
    Dalessandro, Don
    2006 9TH INTERNATIONAL CONFERENCE ON INFORMATION FUSION, VOLS 1-4, 2006, : 1722 - 1727
  • [6] Secret image sharing with separate shadow authentication ability
    Yan, Xuehu
    Gong, Qinghong
    Li, Longlong
    Yang, Guozheng
    Lu, Yuliang
    Liu, Jingju
    SIGNAL PROCESSING-IMAGE COMMUNICATION, 2020, 82
  • [7] A new approach to the secret image sharing with steganography and authentication
    Wu, C-C
    Hwang, M-S
    Kao, S-J
    IMAGING SCIENCE JOURNAL, 2009, 57 (03): : 140 - 151
  • [8] Secret image sharing scheme with adaptive authentication strength
    Ulutas, Guzin
    Ulutas, Mustafa
    Nabiyev, Vasif V.
    PATTERN RECOGNITION LETTERS, 2013, 34 (03) : 283 - 291
  • [9] SISS-CSA: Secret image sharing scheme with ciphertext-based share authentication for malicious model
    Bhat, Krishnaraj
    Jinwala, Devesh C.
    Prasad, Yamuna
    Zaveri, Mukesh A.
    SOFTWARE-PRACTICE & EXPERIENCE, 2024, 54 (12): : 2481 - 2501
  • [10] An image authentication scheme based on digital watermarking and image secret sharing
    Hsieh, Shang-Lin
    Tsai, I-Ju
    Yeh, Chung-Ping
    Chang, Chia-Ming
    MULTIMEDIA TOOLS AND APPLICATIONS, 2011, 52 (2-3) : 597 - 619