Hierarchical Visual Secret Sharing Scheme Using Steganography

被引:0
|
作者
Jana, Biswapati [1 ]
Samanta, Amita [1 ]
Giri, Debasis [2 ]
机构
[1] Vidyasagar Univ, Dept Comp Sci, Midnapore 721102, W Bengal, India
[2] Haldia Inst Technol, Dept Comp Sci & Engn, Haldia 721657, India
来源
MATHEMATICS AND COMPUTING | 2015年 / 139卷
关键词
Visual cryptography; Visual secret sharing; Extended visual secret sharing; Hierarchical visual secret sharing; Steganography; Weight matrix; CRYPTOGRAPHY;
D O I
10.1007/978-81-322-2452-5_25
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
The rapid growth of computer networks and technology constructs a favorable environment that can tolerate the multiusers in a hierarchy based. In any organization the personnel are frequently organized in the form of a hierarchy and there is the requirement that information is distributed over the hierarchy on a "need-to-know" basis. In this paper, we propose a new hierarchical visual secret sharing scheme, where steganographic technique has been used to maintain hierarchy and detect fake share using weight matrix-based embedding method. In this approach, we have used a key matrix (K) and a weight matrix (W) to hide critical information (M) into the share on each level of our proposed scheme. The basic ideas are: (i) to use an EXclusive-OR operator to protect the key matrix (K) and (ii) to use a weight matrix (W) to increase the data hiding ratewhile maintaining high quality of the share image in each level in hierarchy of the scheme. The share generator or Trusted Authority (TA) generates weight matrix Wi for share Si and each level modifies weight matrix Wi+1 using the formula Wi+1 = (W-i x 5 mod 8) + 1 where i = 0, 1, 2,..., n to keep track of level and maintain the hierarchical structure in proposed scheme. The experimental results are demonstrated and tested using Peak Signal-to-Noise Ratio (PSNR) value and relative entropy. It shows that our scheme is superior in terms of PSNR compared to existing schemes.
引用
收藏
页码:363 / 389
页数:27
相关论文
共 50 条
  • [41] XOR-based visual secret sharing scheme using pixel vectorization
    Kannojia, Suresh Prasad
    Kumar, Jasvant
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (10) : 14609 - 14635
  • [42] Secret Sharing Based Visual Cryptography Scheme Using CMY Color Space
    Dahat, Ankush V.
    Chavan, Pallavi V.
    [J]. 1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 563 - 570
  • [43] Secure Visual Secret Sharing Scheme for Color Images Using Visual Cryptography and Digital Watermarking
    Saturwar, Jitendra
    Chaudhari, D. N.
    [J]. PROCEEDINGS OF THE 2017 IEEE SECOND INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND COMMUNICATION TECHNOLOGIES (ICECCT), 2017,
  • [44] Secret Image Sharing with Reversible Steganography
    Chang, Chin-Chen
    Lin, Pei-Yu
    Chan, Chi-Shiang
    [J]. PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND NATURAL COMPUTING, VOL II, 2009, : 253 - +
  • [45] Secret image sharing with steganography and authentication
    Lin, CC
    Tsai, WH
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2004, 73 (03) : 405 - 414
  • [46] Invertible secret image sharing with steganography
    Lin, Pei-Yu
    Chan, Chi-Shiang
    [J]. PATTERN RECOGNITION LETTERS, 2010, 31 (13) : 1887 - 1893
  • [47] Hiding Secret Message using Visual Cryptography in Steganography
    Meghrajani, Yogesh K.
    Mazumdar, Himanshu S.
    [J]. 2015 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2015,
  • [48] Securing graph steganography by using Shamir's secret sharing
    Sari, A. N.
    [J]. INTERNATIONAL CONFERENCE ON INNOVATION IN ENGINEERING AND VOCATIONAL EDUCATION 2019 (ICIEVE 2019), PTS 1-4, 2020, 830
  • [49] Secret image sharing scheme with hierarchical threshold access structure
    Pakniat, Nasrollah
    Noroozi, Mahnaz
    Eslami, Ziba
    [J]. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2014, 25 (05) : 1093 - 1101
  • [50] A Hierarchical Secret Sharing Scheme Based on Information Dispersal Techniques
    Shima, Koji
    Doi, Hiroshi
    [J]. INFORMATION SECURITY AND CRYPTOLOGY (ICISC 2018), 2019, 11396 : 217 - 232