Hierarchical Visual Secret Sharing Scheme Using Steganography

被引:0
|
作者
Jana, Biswapati [1 ]
Samanta, Amita [1 ]
Giri, Debasis [2 ]
机构
[1] Vidyasagar Univ, Dept Comp Sci, Midnapore 721102, W Bengal, India
[2] Haldia Inst Technol, Dept Comp Sci & Engn, Haldia 721657, India
来源
MATHEMATICS AND COMPUTING | 2015年 / 139卷
关键词
Visual cryptography; Visual secret sharing; Extended visual secret sharing; Hierarchical visual secret sharing; Steganography; Weight matrix; CRYPTOGRAPHY;
D O I
10.1007/978-81-322-2452-5_25
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
The rapid growth of computer networks and technology constructs a favorable environment that can tolerate the multiusers in a hierarchy based. In any organization the personnel are frequently organized in the form of a hierarchy and there is the requirement that information is distributed over the hierarchy on a "need-to-know" basis. In this paper, we propose a new hierarchical visual secret sharing scheme, where steganographic technique has been used to maintain hierarchy and detect fake share using weight matrix-based embedding method. In this approach, we have used a key matrix (K) and a weight matrix (W) to hide critical information (M) into the share on each level of our proposed scheme. The basic ideas are: (i) to use an EXclusive-OR operator to protect the key matrix (K) and (ii) to use a weight matrix (W) to increase the data hiding ratewhile maintaining high quality of the share image in each level in hierarchy of the scheme. The share generator or Trusted Authority (TA) generates weight matrix Wi for share Si and each level modifies weight matrix Wi+1 using the formula Wi+1 = (W-i x 5 mod 8) + 1 where i = 0, 1, 2,..., n to keep track of level and maintain the hierarchical structure in proposed scheme. The experimental results are demonstrated and tested using Peak Signal-to-Noise Ratio (PSNR) value and relative entropy. It shows that our scheme is superior in terms of PSNR compared to existing schemes.
引用
收藏
页码:363 / 389
页数:27
相关论文
共 50 条
  • [1] A secret sharing scheme for EBTC using steganography
    Cheonshik Kim
    Dongkyoo Shin
    Dongil Shin
    Raylin Tso
    Chin-Nung Yang
    [J]. Journal of Intelligent Manufacturing, 2014, 25 : 241 - 249
  • [2] A secret sharing scheme for EBTC using steganography
    Kim, Cheonshik
    Shin, Dongkyoo
    Shin, Dongil
    Tso, Raylin
    Yang, Chin-Nung
    [J]. JOURNAL OF INTELLIGENT MANUFACTURING, 2014, 25 (02) : 241 - 249
  • [3] Sound Steganography using Shamir Secret Sharing Scheme
    Kacamak, Salajdin
    Uka, Arban
    [J]. 2017 6TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2017, : 217 - 220
  • [4] On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme
    Wang, Daoshun
    Yi, Feng
    [J]. EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2010,
  • [5] On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme
    Daoshun Wang
    Feng Yi
    [J]. EURASIP Journal on Advances in Signal Processing, 2010
  • [6] Meaningful Secret Image Sharing Scheme with High Visual Quality Based on Natural Steganography
    Sun, Yuyuan
    Lu, Yuliang
    Chen, Jinrui
    Zhang, Weiming
    Yan, Xuehu
    [J]. MATHEMATICS, 2020, 8 (09)
  • [7] Multiple Assignment Secret Sharing Scheme Using Hierarchical Threshold Scheme
    Tochikubo, Kouya
    [J]. 2017 12TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2017, : 456 - 461
  • [8] PUF Authentication using Visual Secret Sharing Scheme
    Naveen, Devarapalli
    Praveen, K.
    [J]. 2019 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS), 2019, : 472 - 475
  • [9] A Lossless Secret Image Sharing Scheme Based on Steganography
    Li, Li
    Abd El-Latif, Ahmed A.
    Yan, Xuehu
    Wang, Shen
    Niu, Xiamu
    [J]. PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 1247 - 1250
  • [10] General Secret Sharing Schemes Using Hierarchical Threshold Scheme
    Tochikubo, Kouya
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2019, E102A (09) : 1037 - 1047