A Common Method of Share Authentication in Image Secret Sharing

被引:46
|
作者
Yan, Xuehu [1 ]
Lu, Yuliang [1 ]
Yang, Ching-Nung [2 ]
Zhang, Xinpeng [3 ]
Wang, Shudong [1 ]
机构
[1] Natl Univ Def Technol, Coll Elect Engn, Hefei 230037, Peoples R China
[2] Natl Dong Hwa Univ, Dept Comp Sci & Informat Engn, Hualien 974, Taiwan
[3] Fudan Univ, Sch Comp Sci, Shanghai 200433, Peoples R China
基金
中国国家自然科学基金;
关键词
Image secret sharing; lossless recovery; share authentication; no pixel expansion; VISUAL CRYPTOGRAPHY; SCHEME; ROBUST; STEGANOGRAPHY;
D O I
10.1109/TCSVT.2020.3025527
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Because of the importance of digital images and their extensive application to digital watermarking, block chain, access control, identity authentication, distributive storage in the cloud and so on, image secret sharing (ISS) is attracting ever-increasing attention. Share authentication is an important issue in its practical application. However, most ISS schemes with share authentication ability require a dealer to participate in the authentication (namely, dealer participatory authentication). In this paper, we design an ISS for a (k, n)-threshold with separate share authentication abilities of both dealer participatory authentication and dealer nonparticipatory authentication. The advantages of polynomial-based ISS and visual secret sharing (VSS) are skillfully fused to achieve these two authentication abilities without sending a share by using a screening operation. In addition, the designed scheme has the characteristics of low decryption (authentication) complexity, lossless decryption and no pixel expansion. Experiments and theoretical analyses are performed to show the effectiveness of the designed scheme.
引用
收藏
页码:2896 / 2908
页数:13
相关论文
共 50 条
  • [31] Random Grid based Extended Visual Secret Sharing Scheme for Image Authentication
    Kukreja, Sonal
    Kasana, Singara Singh
    Kasana, Geeta
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE CONFLUENCE 2018 ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING, 2018, : 870 - 875
  • [32] Transform Domain-Based Invertible and Lossless Secret Image Sharing With Authentication
    Xiong, Lizhi
    Zhong, Xinwei
    Yang, Ching-Nung
    Han, Xiao
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 2912 - 2925
  • [33] Secret image sharing
    Thien, CC
    Lin, JC
    COMPUTERS & GRAPHICS-UK, 2002, 26 (05): : 766 - 770
  • [34] An Image Secret Sharing Method Based on Matrix Theory
    Ding, Wanmeng
    Liu, Kesheng
    Yan, Xuehu
    Wang, Huaixi
    Liu, Lintao
    Gong, Qinghong
    SYMMETRY-BASEL, 2018, 10 (10):
  • [35] A general progressive secret image sharing construction method
    Yan, Xuehu
    Lu, Yuliang
    Liu, Lintao
    SIGNAL PROCESSING-IMAGE COMMUNICATION, 2019, 71 : 66 - 75
  • [36] A new Boolean-based multiple secret image sharing scheme to share different sized secret images
    Chen, Chien-Chang
    Chen, Jun-Long
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 33 : 45 - 54
  • [37] A compressed secret image sharing method with shadow image verification capability
    Yang, Guozheng
    Liu, Lintao
    Yan, Xuehu
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2020, 17 (04) : 4295 - 4316
  • [38] An efficient cheating-detectable secret image sharing scheme with smaller share sizes
    Liu, Zuquan
    Zhu, Guopu
    Zhang, Yu
    Zhang, Hongli
    Kwong, Sam
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 81
  • [39] A share assignment method to maximize the probability of secret sharing reconstruction under the Internet
    Lee, CY
    Yeh, YS
    Chen, DJ
    Ku, KL
    1998 INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, PROCEEDINGS, 1998, : 469 - 477
  • [40] Verifiable Quantum Secret Sharing Protocol Based on Secret Authentication
    Du Yutao
    Bao Wansu
    Li Tan
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2021, 43 (01) : 212 - 217