Security protection using two different image shadows with authentication

被引:8
作者
Liu, Yanjun [1 ]
Chang, Chin-Chen [1 ]
Huang, Peng-Cheng [1 ,2 ]
机构
[1] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
[2] Xiamen Univ Technol, Coll Comp & Informat Engn, Xiamen, Fujian, Peoples R China
基金
中国国家自然科学基金;
关键词
security protection; secret image sharing (SIS); meaningful shadow; turtle shell matrix; cheating detection;
D O I
10.3934/mbe.2019093
中图分类号
Q [生物科学];
学科分类号
07 ; 0710 ; 09 ;
摘要
Secret sharing is an important technique for security protection for multimedia information communication by dividing a secret message into several shadows that are held among a set of participants. In this paper, we introduce a novel secret image sharing (SIS) scheme using two meaningful digital images with cheating detection. It allows a dealer to share a secret message into two different meaningful images through the guidance of the turtle shell magic matrix. Then, after performing a permutation operation, two meaningful shadow images are generated and distributed to two participants. The secret message can be reconstructed only when both participants cooperate by releasing real shadow images. Honest participant in the proposed scheme can easily detect whether the other participant is cheating via presenting a fake shadow. Experimental results show that this method ensures high quality of shadow images and good embedding capacity. The cheating detection process is also effective and easy to implement.
引用
收藏
页码:1914 / 1932
页数:19
相关论文
共 16 条
[1]  
[Anonymous], 1994, WORKSHOP THEORY APPL, DOI 10.1007/BFb0053419
[2]  
Blakley G. R., 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK), P313, DOI 10.1109/MARK.1979.8817296
[3]   High Capacity Reversible Data Hiding in Encrypted Images by Patch-Level Sparse Representation [J].
Cao, Xiaochun ;
Du, Ling ;
Wei, Xingxing ;
Meng, Dan ;
Guo, Xiaojie .
IEEE TRANSACTIONS ON CYBERNETICS, 2016, 46 (05) :1132-1143
[4]  
Chang C.-C., 2007, P IEEE REG 10 INT C, P1, DOI DOI 10.1109/TENCON.2007.4483783
[5]   Sharing secrets in stego images with authentication [J].
Chang, Chin-Chen ;
Hsieh, Yi-Pei ;
Lin, Chia-Hsuan .
PATTERN RECOGNITION, 2008, 41 (10) :3130-3137
[6]  
Chang CC, 2007, FUND INFORM, V76, P399
[7]   A Novel Turtle Shell Based Scheme for Data Hiding [J].
Chang, Ching-Chun ;
Liu, Yanjun ;
Thai-Son Nguyen .
2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, :89-93
[8]   Distortion-free secret image sharing mechanism using modulus operator [J].
Lin, Pei-Yu ;
Lee, Jung-San ;
Chang, Chin-Chen .
PATTERN RECOGNITION, 2009, 42 (05) :886-895
[9]   Quadri-directional searching algorithm for secret image sharing using meaningful shadows [J].
Ngoc-Tu Huynh ;
Bharanitharan, K. ;
Chang, Chin-Chen .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2015, 28 :105-112
[10]   Reversible data hiding scheme based on exploiting modification direction with two steganographic images [J].
Qin, Chuan ;
Chang, Chin-Chen ;
Hsu, Tai-Jung .
MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (15) :5861-5872