×

Distortion-free secret image sharing mechanism using modulus operator. (English) Zbl 1162.68434

Summary: The \((t, n)\)-threshold has been extended to secret image sharing due to its practicability. In this article, we provide a novel version that employs the modulus operator to embed the secret share into a host image. The simulator shows that the modulus operator is useful for decreasing shadow image distortion. Using Rabin’s signature cryptosystem, participants can detect if a cheater exists in the cooperation. In particular, the new mechanism permits involved members to restore a lossless secret image and to reconstruct a distortion-free host image.

MSC:

68P25 Data encryption (aspects in computer science)
68U10 Computing methodologies for image processing
68T10 Pattern recognition, speech recognition
PDFBibTeX XMLCite
Full Text: DOI

References:

[1] Shamir, A., How to share a secret, Commun. ACM, 22, 11, 612-613 (1979) · Zbl 0414.94021
[2] Chang, C. C.; Hwang, R. J., Sharing secret images using shadow codebooks, Inf. Sci., 111, 1, 335-345 (1998)
[3] Thien, C.; Lin, J., Secret image sharing, Comput. Graphics, 26, 1, 765-770 (2002)
[4] Wu, Y. S.; Thien, C. C.; Lin, J. C., Sharing and hiding secret images with size constraint, Pattern Recognition, 37, 7, 1377-1385 (2004)
[5] Chang, C. C.; Lin, C. Y.; Tseng, C. S., Secret image hiding and sharing based on the \((t, n)\)-threshold, Fundam. Inf., 76, 4, 399-411 (2007) · Zbl 1123.68330
[6] Tompa, M.; Woll, H., How to share a secret with cheaters, J. Cryptology, 1, 2, 133-138 (1988) · Zbl 0659.94008
[7] Hwang, R. J.; Lee, W. B.; Chang, C. C., A concept of designing cheater identification methods for secret sharing, J. Syst. Software, 46, 1, 7-11 (1999)
[8] R. Zhao, J.J. Zhao, F. Dai, F.Q. Zhao, A new image secret sharing scheme to identify cheaters, Computer Standards & Interfaces, doi:10.1016/j.csi.2007.10.012.; R. Zhao, J.J. Zhao, F. Dai, F.Q. Zhao, A new image secret sharing scheme to identify cheaters, Computer Standards & Interfaces, doi:10.1016/j.csi.2007.10.012.
[9] Lin, C. C.; Tsai, W. H., Secret image sharing with steganography and authentication, J. Syst. Software, 73, 3, 405-414 (2004)
[10] Yang, C. N.; Chen, T. S.; Yu, K. H.; Wang, C. C., Improvements of image sharing with steganography and authentication, J. Syst. Software, 80, 7, 1070-1076 (2007)
[11] S. Li, X. Zheng, On the security of an image encryption method, in: Proceedings of the 2002 IEEE International Conference on Image Processing, vol. 2, 2002, pp. 925-928.; S. Li, X. Zheng, On the security of an image encryption method, in: Proceedings of the 2002 IEEE International Conference on Image Processing, vol. 2, 2002, pp. 925-928.
[12] Thien, C. C.; Lin, J. C., A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function, Pattern Recognition, 36, 12, 2875-2881 (2003) · Zbl 1059.68154
[13] Li, S.; Li, C.; Lo, K. T.; Chen, G., Cryptanalysis of an image encryption scheme, J. Electron. Imaging, 15, 4, 043012-043113 (2006)
[14] Li, C.; Li, S.; Alvarez, G.; Chen, G.; Lo, K. T., Cryptanalysis of a chaotic block cipher with external key and its improved version, Chaos Solitons Fractals, 37, 7, 299-307 (2008) · Zbl 1136.94320
[15] Stinson, D. R., Cryptography—Theory and Practice (2002), CRC Press: CRC Press New York, USA · Zbl 0997.94001
[16] Rivest, R. L.; Shamir, A.; Adleman, L., A method for obtaining digital signatures and public-key cryptosystems, Commun. ACM, 21, 2, 120-126 (1977) · Zbl 0368.94005
[17] Stallings, W., Cryptography and Network Security-Principles and Practices (2006), Pearson Education Inc.: Pearson Education Inc. New Jersey, USA, pp. 238-241
[18] Fridrich, J., Symmetric ciphers based on two-dimensional chaotic maps, Int. J. Bifurcation Chaos, 8, 6, 1259-1284 (1998) · Zbl 0935.94019
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.