K Out of N Secret Sharing Scheme with Steganography and Authentication

被引:0
|
作者
Fathimal, P. Mohamed [1 ]
Rani, P. Arockia Jansi [1 ]
机构
[1] Manonmaniam Sundaranar Univ, Dept Comp Sci & Engn, Tirunelveli, Tamil Nadu, India
关键词
Threshold secret sharing scheme; Access control; Steganography; Authentication; Secret image sharing; XOR; Pixel expansion;
D O I
10.1007/978-981-10-0251-9_39
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With communication, preservation and processing of information becoming digital, security of such transactions is a matter of prime concern. This has resulted in the development of encryption and cryptography. The degree of security of confidential data is measured by the involvement of one or more people -at times security is guaranteed when a single hand is involved, while at others secrets kept in parts by many ensures security. This has given rise to secret sharing that has emerged as a hot area of research in computer science in the past decade. Existing schemes of secret sharing suffer from pixel expansion and degradation in visual quality of the recovered secret and cover images. This paper aims to develop a steganography and authenticated image sharing (SAIS) scheme for gray and color images with meaningful shares and the authentication ability to detect the manipulation of shadow images. The main features of this scheme is the use of simple Boolean and arithmetic operations and thus the computational complexity is reduced from O(nlog(2)n) to O(n).
引用
收藏
页码:413 / 425
页数:13
相关论文
共 50 条
  • [21] (k, n) secret image sharing scheme with privileged set
    Yang, Ching-Nung
    Li, Peng
    Kuo, Hsin-Chuan
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 73
  • [22] Invertible secret image sharing with steganography and authentication for AMBTC compressed images
    Wu, Xiaotian
    Yang, Ching-Nung
    [J]. SIGNAL PROCESSING-IMAGE COMMUNICATION, 2019, 78 : 437 - 447
  • [23] A high quality image sharing with steganography and adaptive authentication scheme
    Wu, Chia-Chun
    Kao, Shang-Juh
    Hwang, Min-Shiang
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (12) : 2196 - 2207
  • [24] PUF Authentication using Visual Secret Sharing Scheme
    Naveen, Devarapalli
    Praveen, K.
    [J]. 2019 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS), 2019, : 472 - 475
  • [25] Secret image sharing scheme with adaptive authentication strength
    Ulutas, Guzin
    Ulutas, Mustafa
    Nabiyev, Vasif V.
    [J]. PATTERN RECOGNITION LETTERS, 2013, 34 (03) : 283 - 291
  • [26] (k, n) secret image sharing scheme capable of cheating detection
    Liu, Yan-Xiao
    Sun, Qin-Dong
    Yang, Ching-Nung
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2018,
  • [27] (k,n) Secret Sharing Scheme against Two Types of Cheaters
    Liu, Yanxiao
    Wang, Yichuan
    Zhu, Lei
    Jiang, Jiwen
    Hei, Xinhong
    [J]. PROCEEDINGS 2016 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS NANA 2016, 2016, : 284 - 287
  • [28] Constructions and properties of k out of n scalable secret image sharing
    Yang, Ching-Nung
    Huang, Sin-Ming
    [J]. OPTICS COMMUNICATIONS, 2010, 283 (09) : 1750 - 1762
  • [29] Constructions and Properties of k out of n Visual Secret Sharing Schemes
    Verheul E.R.
    Van Tilborg H.C.A.
    [J]. Designs, Codes and Cryptography, 1997, 11 (2) : 179 - 196
  • [30] An Optimal (k,n)Visual Secret Sharing Scheme for Information Security
    Hodeish, Mahmoud E.
    Bukauskas, Linas
    Humbe, Vikas T.
    [J]. PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATIONS, 2016, 93 : 760 - 767