A Common Method of Share Authentication in Image Secret Sharing

被引:46
|
作者
Yan, Xuehu [1 ]
Lu, Yuliang [1 ]
Yang, Ching-Nung [2 ]
Zhang, Xinpeng [3 ]
Wang, Shudong [1 ]
机构
[1] Natl Univ Def Technol, Coll Elect Engn, Hefei 230037, Peoples R China
[2] Natl Dong Hwa Univ, Dept Comp Sci & Informat Engn, Hualien 974, Taiwan
[3] Fudan Univ, Sch Comp Sci, Shanghai 200433, Peoples R China
基金
中国国家自然科学基金;
关键词
Image secret sharing; lossless recovery; share authentication; no pixel expansion; VISUAL CRYPTOGRAPHY; SCHEME; ROBUST; STEGANOGRAPHY;
D O I
10.1109/TCSVT.2020.3025527
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Because of the importance of digital images and their extensive application to digital watermarking, block chain, access control, identity authentication, distributive storage in the cloud and so on, image secret sharing (ISS) is attracting ever-increasing attention. Share authentication is an important issue in its practical application. However, most ISS schemes with share authentication ability require a dealer to participate in the authentication (namely, dealer participatory authentication). In this paper, we design an ISS for a (k, n)-threshold with separate share authentication abilities of both dealer participatory authentication and dealer nonparticipatory authentication. The advantages of polynomial-based ISS and visual secret sharing (VSS) are skillfully fused to achieve these two authentication abilities without sending a share by using a screening operation. In addition, the designed scheme has the characteristics of low decryption (authentication) complexity, lossless decryption and no pixel expansion. Experiments and theoretical analyses are performed to show the effectiveness of the designed scheme.
引用
收藏
页码:2896 / 2908
页数:13
相关论文
共 50 条
  • [41] A Common General Access Structure Construction Approach in Secret Image Sharing
    Yan, Xuehu
    Lu, Yuliang
    Liu, Lintao
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2020, 12 (03) : 96 - 110
  • [42] A share assignment method to maximize the probability of secret sharing reconstruction under the Internet
    Lee, CY
    Yeh, YS
    Chen, DJ
    Ku, KL
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2000, E83D (02) : 190 - 199
  • [43] Ideal Secret Sharing Schemes with Share Selectability
    Emura, Keita
    Miyaji, Atsuko
    Nomura, Akito
    Rahman, Mohammad Shahriar
    Soshi, Masakazu
    INFORMATION AND COMMUNICATIONS SECURITY, 2011, 7043 : 143 - +
  • [44] REDUCED SHARE SIZE AUDIO SECRET SHARING
    Patil, Sonali
    Deshmukh, P. R.
    Chavan, Tejal
    Shastri, Vinay
    Sangwan, Priyanka
    Sunthwal, Akash
    2015 INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING (ICPC), 2015,
  • [45] Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing
    Yan, Xuehu
    Li, Longlong
    Chen, Jia
    Sun, Lei
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2023, 24 (01) : 88 - 103
  • [46] An authentication protocol based on threshold secret sharing
    Thuc, Nguyen Dinh
    Bao, Tran Ngoc
    Proceedings of the ISSAT International Conference on Modeling of Complex Systems and Environments, Proceedings, 2007, : 96 - 100
  • [47] Secret Sharing Scheme for Group Authentication - A Review
    Narad, S. K.
    Sayankar, M. R.
    Alone, S. V.
    Mahiskar, P. S.
    2017 INTERNATIONAL CONFERENCE OF ELECTRONICS, COMMUNICATION AND AEROSPACE TECHNOLOGY (ICECA), VOL 1, 2017, : 12 - 16
  • [48] Authentication as A Service Based on Shamir Secret Sharing
    Bissoli, Andrea
    d'Amore, Fabrizio
    2021 INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND INTELLIGENT CONTROLS (ISCSIC 2021), 2021, : 368 - 373
  • [49] An image secret sharing scheme with the capability of previvewing the secret image
    Yang, Ching-Nung
    Chen, Tse-Shih
    2007 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-5, 2007, : 1535 - 1538
  • [50] Renewal of secret and shadows in secret image sharing
    Yu, Yongqiang
    Yan, Xuehu
    Li, Longlong
    Wang, Jiayu
    IET INFORMATION SECURITY, 2022, 16 (06) : 432 - 441