A secret image sharing method based on block-wise cheating detection and recovery on shadow images

被引:0
|
作者
Gul, Ertugrul [1 ,3 ]
Ozturk, Serkan [2 ,4 ]
机构
[1] Kayseri Univ, Dept Software Engn, TR-38280 Kayseri, Turkiye
[2] Erciyes Univ, Dept Comp Engn, TR-38039 Kayseri, Turkiye
[3] Kayseri Univ, Fac Engn Architecture & Design, Dept Software Engn, TR-38280 Kayseri, Turkiye
[4] Erciyes Univ, Fac Engn, Dept Comp Engn, TR-38039 Kayseri, Turkiye
关键词
Secret image sharing; (k n) thresholding; Block authentication; Cheating detection;
D O I
10.1016/j.compeleceng.2023.108882
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In (k, n) threshold schemes, it is very important to determine which shadow images are cheated on and which shadow images will be used in the recovery of the secret image. Also, some of the cheated shadow images may have not cheated regions. Therefore, authentication of the shadow image's blocks is necessary. In this paper, a secret image sharing method using block-wise cheating detection and recovery is proposed. With the proposed block-wise method, even if all shadow images have been cheated, recovery of the secret images is performed with the block-based authentication and recovery mechanism. In the proposed recovery process, it is sufficient for k of each paired block group in the n shadow image to be not cheated. Experimental results illustrated that the proposed method successfully recovered the secret image even if n shadow images were cheated, and the randomness of the proposed method is satisfactory.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] BLOCK-WISE AUTHENTICATION METHOD FOR DIGITAL IMAGES
    Nahtigal, Tomaz
    Zemva, Andrej
    [J]. JOURNAL OF ELECTRICAL ENGINEERING-ELEKTROTECHNICKY CASOPIS, 2012, 63 (05): : 289 - 295
  • [2] A New Blind Image Authentication for Image Tampering Detection and Recovery Based on Block-wise Feature Classification
    Chou, Yung-Chen
    Yeh, Chun-Hsiu
    Shen, Jau-Ji
    Jan, Jinn-Ke
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (06): : 1907 - 1917
  • [3] Secret image sharing with smaller shadow images
    Wang, RZ
    Su, CH
    [J]. PATTERN RECOGNITION LETTERS, 2006, 27 (06) : 551 - 555
  • [4] Reduce shadow size in aspect ratio invariant visual secret sharing schemes using a square block-wise operation
    Yang, CN
    Chen, TS
    [J]. PATTERN RECOGNITION, 2006, 39 (07) : 1300 - 1314
  • [5] Block-Wise Image Transformation With Secret Key for Adversarially Robust Defense
    Aprilpyone, Maungmaung
    Kiya, Hitoshi
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 2709 - 2723
  • [6] Scalable Secret Image Sharing With Smaller Shadow Images
    Lin, Yung-Yi
    Wang, Ran-Zan
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2010, 17 (03) : 316 - 319
  • [7] A Threshold Secret Image Sharing with Essential Shadow Images
    Yang, Ching-Nung
    Wu, Chih-Cheng
    [J]. Smart Innovation, Systems and Technologies, 2013, 21 : 159 - 166
  • [8] Block-Wise Gaze Estimation Based on Binocular Images
    Wu, Xuemei
    Li, Jing
    Wu, Qiang
    Sun, Jiande
    Yan, Hua
    [J]. IMAGE AND VIDEO TECHNOLOGY (PSIVT 2017), 2018, 10749 : 477 - 487
  • [9] BLOCK-WISE ULTRASOUND IMAGE DECONVOLUTION FROM FUNDAMENTAL AND HARMONIC IMAGES
    Hourani, Mohamad
    Basarab, Adrian
    Varray, Francois
    Kouame, Denis
    Toumeret, Jean-Yves
    [J]. PROCEEDINGS OF THE 2020 IEEE INTERNATIONAL ULTRASONICS SYMPOSIUM (IUS), 2020,
  • [10] Piracy-Resistant DNNWatermarking by Block-Wise Image Transformation with Secret Key
    Pyone, April
    Maung, Maung
    Kiya, Hitoshi
    [J]. PROCEEDINGS OF THE 2021 ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY, IH&MMSEC 2021, 2021, : 159 - 164