Browse > Article
http://dx.doi.org/10.9717/kmms.2013.16.5.577

A Proactive Secret Image Sharing Scheme over GF(28)  

Hyun, Suhng-Ill (영진사이버대학 정보통신공학계열)
Shin, Sang-Ho (경북대학교 IT대학 컴퓨터학부)
Yoo, Kee-Young (경북대학교 IT대학 컴퓨터학부)
Publication Information
Abstract
Shamir's (k,n)-threshold secret sharing scheme is not secure against cheating by attacker because the signature of participants is omitted. To prevent cheating, many schemes have been proposed, and a proactive secret sharing is one of those. The proactive secret sharing is a method to update shares in the secret sharing scheme at irregular intervals. In this paper, a proactive image secret sharing scheme over $GF(2^8)$ is proposed for the first time. For the past 30 years, Galois field operation is widely used in order to perform the efficient and secure bit operation in cryptography, and the proposed scheme with update phase of shadow image over $GF(2^8)$) at irregular intervals provides the lossless and non-compromising of secret image. To evaluate security and efficiency of images (i.e. cover and shadow images) distortion between the proposed scheme and the previous schemes, embedding capacity and PSNR are compared in experiments. The experimental results show that the performances of the embedding capacity and image distortion ratio of the proposed scheme are superior to the previous schemes.
Keywords
Secret Image Sharing; Proactive Secret Sharing; Information Hiding; Galois Field;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 W. Stallings, Cryptography and Network Security, Prentice Hall, 5rd Edtion, 2010, Upper Saddle River, NJ, USA.
2 A. Menezes, P.C. van Oorschot, and S.A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1996, Boca Raton, FL, USA.
3 A. Shamir, "How to Share a Secret," Communications of the ACM, Vol. 22, No. 11, pp. 612- 613, 1979.   DOI   ScienceOn
4 G.R. Blakley, "Safeguarding Cryptographic Keys," Managing Requirements Knowledge, Proc. International Workshop on the National Computer Conference, pp. 313- 317, 1979.
5 I. Mitsuru, S. Akira, and N. Takao, "Secret Sharing Scheme Realizing General Access Structure," Electronics and Communications in J apan (Part III : Fundamental Electronic Science), Vol. 72, Issue 9, pp. 1520-6440, 1989.
6 S. Berry, "A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic Voting," Advances in Cryptology- CRYPTO' 99, Lecture Notes in Computer Science 1666, pp. 148-164, 1999
7 F. Paul, "A Practical Scheme for Non-Interactive Verifiable Secret Sharing," Proc. 28th Annual Symposium on Foundations of Computer Science, pp. 427-438, 1987.
8 B. Josh and L. Jerry, "Generalized Secret Sharing and Monotone Functions," Advances in Cryptology-CRYPTO' 88, Lecture Notes in Computer Science 403, pp. 27-35, 1990.
9 C-C Chang and R-J Hwang, "Efficient Cheater Identification Method for Threshold Schemes," IEE Proceedings of Computers & Digital Techcuques, Vol. 144, No. 1, pp. 23-27, 1997.   DOI   ScienceOn
10 A. Beimel and B. Chor, "Secret Sharing with Public Reconstruction," IEEE Transactions on Information Theory, Vol. 44, No. 5, pp. 1887-1896, 1998.   DOI
11 M. Naor and A. Shamir, "Visual Cryptography," EUROCRYPT' 94, Lecture Notes in Computer Science 950, pp. 1-12, 1995.
12 M. Naor and A. Shamir, "Visual Cryptography II: Improving the Contrast Via the Cover Base," EUROCRYPT' 96, Lecture Notes in Computer Science 1189, pp. 197-202, 1997.
13 C-C Thien and J-C Lin, "Secret Image Sharing," Journal of Computers & Graphics, Vol. 26, No. 5, pp. 765-770, 2002.   DOI   ScienceOn
14 C-C Chang, Y-P Hsieh and C-H Lin, "Sharing Secrets in Stego Images with Authentication," Journal of Pattern Recognition, Vol. 41, No. 10, pp. 3130-3137, 2008.   DOI   ScienceOn
15 C-C Lin and W-H Tsai, "Secret Image Sharing with Steganography and Authentication," Journal of Systems and Software, Vol. 73, No. 3, pp. 405-414, 2004.   DOI   ScienceOn
16 Y-S Wu, C-C Thien and J-C Lin, "Sharing and Hiding Secret Images with Size Constraint," Journal of Pattern Recognition, Vol. 37, No. 7, pp. 1377-1385, 2004.   DOI   ScienceOn
17 R-Z Wang and S-J Shyu, "Scalable Secret Image Sharing," Journal of Signal Processing: Image Communication, Vol. 22, No. 4, pp. 363-373, 2007.   DOI   ScienceOn
18 P-Y Lin and C-S Chan, "Invertible Secret Image Sharing with Steganography," Journal of Pattern Recognition Letters, Vol. 31, No. 13, pp. 1887-1893, 2010.   DOI   ScienceOn
19 M. Tompa and H. Woll, "How To Share a Secret with Chearters," Journal of Cryptology, Vol. 1, No. 2, pp. 133-138, 1988.
20 A. Herzberg, S. Jarecki, H. Krawczyk and M. Yung, "Proactive Secret Sharing Or: How to Cope With Perpetual Leakage," Proc. the 15th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO' 95), pp. 339-352, 1995.
21 A. Cheddad, J. Condell, K. Curran and P. McKevitt, "Digital Image Steganography: Survey and Analysis of Current Methods," Journal of Signal Processing, Vol. 90, No. 3, pp. 727-752, 2010.   DOI   ScienceOn
22 B. Li, J. He, J. Huang and Y.Q. Shi, "A Survey on Image Steganography and Steganalysis," Journal of Information Hiding and Multimedia Signal Processing, Vol. 2, No. 2, pp. 142- 172, 2011.
23 김기종, 신상호, 유기영, "비밀데이터의 패턴정보에 기반한 새로운 정보은익 기법," 멀티미디어학회논문지, 제15권, 제4호, pp. 526-539, 2012.
24 장봉주, 이석환, 권기룡, "전염성 정보은닉 시스템을 위한 능동형 비디오 워터마킹 기법," 멀티미디어학회논문지, 제15권, 제8호, pp. 1017-1030, 2012.