Meaningful secret sharing technique with authentication and remedy abilities

被引:36
作者
Chang, Chin-Chen [2 ]
Chen, Yi-Hui [1 ]
Wang, Hsin-Chi [3 ]
机构
[1] Asia Univ, Dept Appl Informat & Multimedia, Taichung 41354, Taiwan
[2] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
[3] Inst Informat Ind, Dept Informat & Commun, Secur Technol Ctr, Taipei 10622, Taiwan
关键词
Secret-sharing; Authentication; Visual quality; Remedy ability; MULTIPLE SECRETS; COLOR IMAGES; SCHEME; STEGANOGRAPHY;
D O I
10.1016/j.ins.2011.03.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Lin and Tasi, Yang et al.. and Chang et al.'s meaningful secret sharing schemes provided authentication mechanisms but none included a remedy ability that would cause the secret image never to be completely obtained while some information of the stego-images are losing or tampering with. This paper proposes a meaningful secret-sharing scheme which includes both authentication and remedy abilities that allow for detection of the corrupted area and use of the hidden information to repair the secret image with reasonable visual quality. In comparison with previous schemes, this approach results in superior visual qualities of the stego-images by an average of more than 3 dB. (C) 2011 Elsevier Inc. All rights reserved.
引用
收藏
页码:3073 / 3084
页数:12
相关论文
共 17 条
[1]   Sharing secrets in stego images with authentication [J].
Chang, Chin-Chen ;
Hsieh, Yi-Pei ;
Lin, Chia-Hsuan .
PATTERN RECOGNITION, 2008, 41 (10) :3130-3137
[2]   A novel secret image sharing scheme in color images using small shadow images [J].
Chang, Chin-Chen ;
Lin, Chia-Chen ;
Lin, Chia-Hsuan ;
Chen, Yi-Hui .
INFORMATION SCIENCES, 2008, 178 (11) :2433-2447
[3]  
Chang CC, 2007, FUND INFORM, V76, P399
[4]   A multiple-level visual secret-sharing scheme without image size expansion [J].
Chen, Yung-Fu ;
Chan, Yung-Kuan ;
Huang, Ching-Chun ;
Tsai, Meng-Hsiun ;
Chu, Yen-Ping .
INFORMATION SCIENCES, 2007, 177 (21) :4696-4710
[5]   Friendly progressive visual secret sharing [J].
Fang, Wen-Pinn .
PATTERN RECOGNITION, 2008, 41 (04) :1410-1414
[6]   A new multi-secret images sharing scheme using Largrange's interpolation [J].
Feng, JB ;
Wu, HC ;
Tsai, CS ;
Chu, YP .
JOURNAL OF SYSTEMS AND SOFTWARE, 2005, 76 (03) :327-339
[7]   A new data hiding scheme for binary image authentication with small image distortion [J].
Lee, Younho ;
Kim, Heeyoul ;
Park, Yongsu .
INFORMATION SCIENCES, 2009, 179 (22) :3866-3884
[8]   Secret image sharing with steganography and authentication [J].
Lin, CC ;
Tsai, WH .
JOURNAL OF SYSTEMS AND SOFTWARE, 2004, 73 (03) :405-414
[9]   A copyright protection scheme for digital images using visual cryptography technique [J].
Lou, Der-Chyuan ;
Tso, Hao-Kuan ;
Liu, Jiang-Lung .
COMPUTER STANDARDS & INTERFACES, 2007, 29 (01) :125-131
[10]   Bit-level based secret sharing for image encryption [J].
Lukac, R ;
Plataniotis, KN .
PATTERN RECOGNITION, 2005, 38 (05) :767-772