DOI QR코드

DOI QR Code

(2, 2) Secret Sharing Using Data Hiding and Multiplexer Technique

데이터 은닉과 멀티플렉서 기법을 이용한 (2, 2) 비밀 공유방법

  • 김천식 (안양대학교 디지털미디어공학과)
  • Received : 2013.07.08
  • Accepted : 2013.08.16
  • Published : 2013.08.31

Abstract

We presents a novel (2, 2) secret sharing (SS) scheme for all grayscale images. Generally, a secret image is distribute more than two shadow images, which are dealt out among participants. In order to find out secret image, participants print shadow images to transparent papers. Then, a secret image will appear as stacking transparent papers. The secret sharing scheme in this paper distribute secret image into natural grayscale images using multiplexer and data hiding scheme. After then, two participant have two shadow images respectively. The merit of the proposed scheme is that shadow images have small loss in aspect of the quality with steganographic features. Therefore, the proposed secret sharing scheme in this paper is not easily detected by attackers. The experiment result verified that the proposed scheme, obviously outperforms previous SS schemes.

본 논문은 회색(Gray-scale) 이미지를 기반으로 (2, 2) 비밀 공유(Secret Sharing) 계획을 제안한다. 일반적으로 비밀 공유 방법은 비밀 이미지를 두개이상의 이미지 (그림자 이미지: Shadow Image)로 분배한 후, 그림자 이미지를 참가자(비밀 공유하는 사람)에게 나누어준다. 이 후 참가자들이 비밀을 보기위해 k(k

Keywords

References

  1. A. Shamir, "How to share a secret," Communications of the Association for Computing Machinery, pp.612-613, 1979.
  2. Moni Naor, Adi Shamir: "Visual Cryptography," EUROCRYPT, pp.1-12, 1994.
  3. C.C. Thien, J.C. Lin, "Secret image sharing," Computers and Graphics, vol. 26, no. 1, pp. 765- 770, 2002. https://doi.org/10.1016/S0097-8493(02)00131-0
  4. C.C. Chang, C.C. Lin, C.H. Lin, Y.H. Chen, "A novel secret image sharing scheme in color images using small shadow images," Information Sciences, vol. 178, no.11, pp.2433-2447, 2008. https://doi.org/10.1016/j.ins.2007.12.016
  5. C.C. Chang, C.Y. Lin, C.S. Tseng, "Secret image hiding and sharing based on the (t,n)-threshold," Fundamenta Informaticae, vol. 76, no. 4, pp.399- 411, 2007.
  6. J.B. Feng, H.C. Wu, C.S. Tsai, Y.P. Chu, "A new multi-secret images sharing scheme using Lagrange's interpolation," Journal of Systems and Software, vol. 76, no. 3, pp. 327-339, 2005. https://doi.org/10.1016/j.jss.2004.07.250
  7. S.J. Shyu, S.Y. Huang, Y.K. Lee, R.Z. Wang, K. Chen, "Sharing multiple secrets in visual cryptography," Pattern Recognition, vol. 40, no. 12, pp. 3633-3651, 2007. https://doi.org/10.1016/j.patcog.2007.03.012
  8. D.S. Tsai, G. Horng, Z.H. Chen, Y.T. Huang, "A novel secret image sharing scheme for true-color images with size constraint," Information Sciences, vol. 179, no. 19, pp.3247-3254, 2009. https://doi.org/10.1016/j.ins.2009.05.020
  9. C.S. Tsai, C.C. Chang, T.S. Chen, "Sharing multiple secrets in digital images," Journal of Systems and Software, vol. 64, no. 2, pp.163-170, 2002. https://doi.org/10.1016/S0164-1212(02)00034-1
  10. C.C. Chang, Y.P. Hsieh, C.H. Lin, "Sharing secrets in stego images with authentication," Pattern Recognition, vol.141, no.10, pp.3130-3137, 2008.
  11. C.C. Lin, W.H. Tsai, "Secret image sharing with steganography and authentication," Journal of Systems and Software, vol.73, no.3, pp. 405-414, 2004 https://doi.org/10.1016/S0164-1212(03)00239-5
  12. C.N. Yang, T.S. Chen, K.H. Yu, C.C. Wang, "Improvements of image sharing with steganography and authentication," Journal of Systems and Software, vol.80, no.7, pp.1070-1076, 2007. https://doi.org/10.1016/j.jss.2006.11.022
  13. Y.F. Chen, Y.K. Chan, C.C. Huang, M.H. Tsai, Y.P. Chu, "A multiple-level visual secret-sharing scheme without image size expansion," Information Sciences, vol. 177, no. 21, pp.4696-4710, 2007. https://doi.org/10.1016/j.ins.2007.05.011
  14. W.P. Fang, "Friendly progressive visual secret sharing," Pattern Recognition, vol. 41, no. 4, pp. 2008.
  15. D.C. Lou, H.K. Tso, J.L. Liu, "A copyright protection scheme for digital images using visual cryptography technique," Computer Standards and Interfaces, vol. 29, pp.125-131, 2007. https://doi.org/10.1016/j.csi.2006.02.003
  16. R. Lukac, K.N. Plataniotis, "Bit-level based secret sharing for image encryption," Pattern Recognition, vol. 38, no. 5, pp.767-772, 2005. https://doi.org/10.1016/j.patcog.2004.11.010
  17. M. Naor, A. Shamir, "Visual cryptography," in: Advances in Cryptology-EuroCrypt'94, LNCS, Springer, Berlin, vol. 950, pp.1-2, 1995.
  18. Chin-Chen Chang, Chia-Chen Lin, T. Hoang Ngan Le, Hoai Bac Le: "Sharing a verifiable secret image using two shadows," Pattern Recognition, vol. 42, no.11, pp. 3097-3114, 2009. https://doi.org/10.1016/j.patcog.2009.04.012
  19. J. Cai, A Short Survey On Visual Cryptography Schemes, 2004, Available: http://www.cs.toronto.edu/-jcai/paper.pdf
  20. J.K. Moon, J.M. Kim, H.R. Kim, A Secure Authentication Protocol for Cloud Services, Journal of Advanced Information Technology and Convergence, vol.1, no.2, pp.33-36, 2011. https://doi.org/10.5121/ijait.2011.1603
  21. J.K. Baek, J.P. Park, A Study on Personal Information Control and Security in Printed Matter, Journal of the Korea Academia Industrial, vol.14, no.5, pp.2415-2421, 2013. https://doi.org/10.5762/KAIS.2013.14.5.2415

Cited by

  1. Secret Sharing based on DCT using XOR vol.14, pp.4, 2014, https://doi.org/10.7236/JIIBC.2014.14.4.13