Secret image sharing scheme with hierarchical threshold access structure

被引:35
作者
Pakniat, Nasrollah [1 ]
Noroozi, Mahnaz [1 ]
Eslami, Ziba [1 ]
机构
[1] Shahid Beheshti Univ, Dept Comp Sci, GC, Tehran, Iran
关键词
Cryptography; Secret image sharing; Hierarchical threshold access structure; Cellular automata; Birkhoff interpolation; Information hiding; Reversibility; Tamper detection; CELLULAR-AUTOMATA; STEGANOGRAPHY; SUBSTITUTION;
D O I
10.1016/j.jvcir.2014.03.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A hierarchical threshold secret image sharing (HTSIS) scheme is a method to share a secret image among a set of participants with different levels of authority. Recently, Guo et al. (2012) [22] proposed a HTSIS scheme based on steganography and Birkhoff interpolation. However, their scheme does not provide the required secrecy needed for HTSIS schemes so that some non-authorized subsets of participants are able to recover parts of the secret image. In this paper, we employ cellular automata and Birkhoff interpolation to propose a secure HTSIS scheme. In the new scheme, each authorized subset of participants is able to recover both the secret and cover images losslessly whereas non-authorized subsets obtain no information about the secret image. Moreover, participants are able to detect tampering of the recovered secret image. Experimental results show that the proposed scheme outperforms Guo et al.'s approach in terms of visual quality as well. (c) 2014 Elsevier Inc. All rights reserved.
引用
收藏
页码:1093 / 1101
页数:9
相关论文
共 25 条
[1]   Reversible cellular automata with memory: two-dimensional patterns from a single site seed [J].
Alonso-Sanz, R .
PHYSICA D-NONLINEAR PHENOMENA, 2003, 175 (1-2) :1-30
[2]  
Blakley G.R., 1979, INT WORKSH MAN REQ K, DOI [10.1109/MARK.1979.8817296, DOI 10.1109/MARK.1979.8817296]
[3]   Hiding data in images by simple LSB substitution [J].
Chan, CK ;
Cheng, LM .
PATTERN RECOGNITION, 2004, 37 (03) :469-474
[4]   Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy [J].
Chang, CC ;
Hsiao, JY ;
Chan, CS .
PATTERN RECOGNITION, 2003, 36 (07) :1583-1595
[5]   Secret image sharing with authentication-chaining and dynamic embedding [J].
Eslami, Z. ;
Ahmadabadi, J. Zarepour .
JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (05) :803-809
[6]   A verifiable multi-secret sharing scheme based on cellular automata [J].
Eslami, Z. ;
Ahmadabadi, J. Zarepour .
INFORMATION SCIENCES, 2010, 180 (15) :2889-2894
[7]   Secret image sharing based on cellular automata and steganography [J].
Eslami, Z. ;
Razzaghi, S. H. ;
Ahmadabadi, J. Zarepour .
PATTERN RECOGNITION, 2010, 43 (01) :397-404
[8]   Friendly progressive visual secret sharing [J].
Fang, Wen-Pinn .
PATTERN RECOGNITION, 2008, 41 (04) :1410-1414
[9]   Visual secret sharing for multiple secrets [J].
Feng, Jen-Bang ;
Wu, Hsien-Chu ;
Tsai, Chwei-Shyong ;
Chang, Ya-Fen ;
Chu, Yen-Ping .
PATTERN RECOGNITION, 2008, 41 (12) :3572-3581
[10]   A hierarchical threshold secret image sharing [J].
Guo, Cheng ;
Chang, Chin-Chen ;
Qin, Chuan .
PATTERN RECOGNITION LETTERS, 2012, 33 (01) :83-91