K Out of N Secret Sharing Scheme with Steganography and Authentication

被引:0
|
作者
Fathimal, P. Mohamed [1 ]
Rani, P. Arockia Jansi [1 ]
机构
[1] Manonmaniam Sundaranar Univ, Dept Comp Sci & Engn, Tirunelveli, Tamil Nadu, India
关键词
Threshold secret sharing scheme; Access control; Steganography; Authentication; Secret image sharing; XOR; Pixel expansion;
D O I
10.1007/978-981-10-0251-9_39
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With communication, preservation and processing of information becoming digital, security of such transactions is a matter of prime concern. This has resulted in the development of encryption and cryptography. The degree of security of confidential data is measured by the involvement of one or more people -at times security is guaranteed when a single hand is involved, while at others secrets kept in parts by many ensures security. This has given rise to secret sharing that has emerged as a hot area of research in computer science in the past decade. Existing schemes of secret sharing suffer from pixel expansion and degradation in visual quality of the recovered secret and cover images. This paper aims to develop a steganography and authenticated image sharing (SAIS) scheme for gray and color images with meaningful shares and the authentication ability to detect the manipulation of shadow images. The main features of this scheme is the use of simple Boolean and arithmetic operations and thus the computational complexity is reduced from O(nlog(2)n) to O(n).
引用
收藏
页码:413 / 425
页数:13
相关论文
共 50 条
  • [1] K out of N Secret Sharing Scheme for Multiple Color Images with Steganography and Authentication
    Fathimal, P. Mohamed
    Rani, P. Arockia Jansi
    [J]. INTERNATIONAL JOURNAL OF IMAGE AND GRAPHICS, 2016, 16 (02)
  • [2] Secret image sharing with steganography and authentication
    Lin, CC
    Tsai, WH
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2004, 73 (03) : 405 - 414
  • [3] K out of N Secret Sharing Scheme for Gray and Color Images
    Fathimal, P. Mohamed
    Rani, P. Arockia Jansi
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND COMMUNICATION TECHNOLOGIES, 2015,
  • [4] A New k out of n Secret Image Sharing Scheme in Visual Cryptography
    Shankar, K.
    Eswaran, P.
    [J]. PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO'16), 2016,
  • [5] A new approach to the secret image sharing with steganography and authentication
    Wu, C-C
    Hwang, M-S
    Kao, S-J
    [J]. IMAGING SCIENCE JOURNAL, 2009, 57 (03): : 140 - 151
  • [6] Secret sharing systems with authentication-based steganography
    Wang, Shiuh-Jeng
    Lin, I-Shuan
    Hsieh, Ye-Lin
    Weng, Chi-Yao
    [J]. 2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 1146 - +
  • [7] A secret sharing scheme for EBTC using steganography
    Cheonshik Kim
    Dongkyoo Shin
    Dongil Shin
    Raylin Tso
    Chin-Nung Yang
    [J]. Journal of Intelligent Manufacturing, 2014, 25 : 241 - 249
  • [8] A secret sharing scheme for EBTC using steganography
    Kim, Cheonshik
    Shin, Dongkyoo
    Shin, Dongil
    Tso, Raylin
    Yang, Chin-Nung
    [J]. JOURNAL OF INTELLIGENT MANUFACTURING, 2014, 25 (02) : 241 - 249
  • [9] A {k,n}-secret sharing scheme for color images
    Lukac, R
    Plataniotis, KN
    Venetsanopoulos, AN
    [J]. COMPUTATIONAL SCIENCE - ICCS 2004, PROCEEDINGS, 2004, 3039 : 72 - 79
  • [10] On a fast (k,n)-threshold secret sharing scheme
    Kurihara, Jun
    Kiyomoto, Shinsaku
    Fukushima, Kazuhide
    Tanaka, Toshiaki
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (09) : 2365 - 2378