Security protection using two different image shadows with authentication

被引:8
作者
Liu, Yanjun [1 ]
Chang, Chin-Chen [1 ]
Huang, Peng-Cheng [1 ,2 ]
机构
[1] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
[2] Xiamen Univ Technol, Coll Comp & Informat Engn, Xiamen, Fujian, Peoples R China
基金
中国国家自然科学基金;
关键词
security protection; secret image sharing (SIS); meaningful shadow; turtle shell matrix; cheating detection;
D O I
10.3934/mbe.2019093
中图分类号
Q [生物科学];
学科分类号
07 ; 0710 ; 09 ;
摘要
Secret sharing is an important technique for security protection for multimedia information communication by dividing a secret message into several shadows that are held among a set of participants. In this paper, we introduce a novel secret image sharing (SIS) scheme using two meaningful digital images with cheating detection. It allows a dealer to share a secret message into two different meaningful images through the guidance of the turtle shell magic matrix. Then, after performing a permutation operation, two meaningful shadow images are generated and distributed to two participants. The secret message can be reconstructed only when both participants cooperate by releasing real shadow images. Honest participant in the proposed scheme can easily detect whether the other participant is cheating via presenting a fake shadow. Experimental results show that this method ensures high quality of shadow images and good embedding capacity. The cheating detection process is also effective and easy to implement.
引用
收藏
页码:1914 / 1932
页数:19
相关论文
共 16 条
[11]   HOW TO SHARE A SECRET [J].
SHAMIR, A .
COMMUNICATIONS OF THE ACM, 1979, 22 (11) :612-613
[12]   Efficient visual secret sharing scheme for color images [J].
Shyu, SH .
PATTERN RECOGNITION, 2006, 39 (05) :866-880
[13]   An image-sharing method with user-friendly shadow images [J].
Thien, CC ;
Lin, JC .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2003, 13 (12) :1161-1169
[14]   Generalized Random Grid and Its Applications in Visual Cryptography [J].
Wu, Xiaotian ;
Sun, Wei .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (09) :1541-1553
[15]   User-friendly image sharing using polynomials with different primes [J].
Yang, Ching-Nung ;
Yu, Kun-Hsuan ;
Lukac, Rastislav .
INTERNATIONAL JOURNAL OF IMAGING SYSTEMS AND TECHNOLOGY, 2007, 17 (01) :40-47
[16]   Reduce shadow size in aspect ratio invariant visual secret sharing schemes using a square block-wise operation [J].
Yang, CN ;
Chen, TS .
PATTERN RECOGNITION, 2006, 39 (07) :1300-1314