Browse > Article
http://dx.doi.org/10.9717/kmms.2014.17.8.953

Secret Image Sharing Scheme using Matrix Decomposition and Adversary Structure  

Hyun, Suhng-Ill (Division of Info and Comm, Yeungjin Cyber College)
Shin, Sang-Ho (School of Computer Science and Engineering Kyungpook National University)
Yoo, Kee-Young (School of Computer Science and Engineering Kyungpook National University)
Publication Information
Abstract
In Shamir's (t,n)-threshold based secret image sharing schemes, there exists a problem that the secret image can be reconstructed when an arbitrary attacker becomes aware of t secret image pieces, or t participants are malicious collusion. It is because that utilizes linear combination polynomial arithmetic operation. In order to overcome the problem, we propose a secret image sharing scheme using matrix decomposition and adversary structure. In the proposed scheme, there is no reconstruction of the secret image even when an arbitrary attacker become aware of t secret image pieces. Also, we utilize a simple matrix decomposition operation in order to improve the security of the secret image. In experiments, we show that performances of embedding capacity and image distortion ratio of the proposed scheme are superior to previous schemes.
Keywords
Secret Image Sharing; Adversary Structure; Matrix Decomposition; Data Hiding;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 W. Zhu, C. Luo, J. Wang, and S. Li, "Multimedia Cloud Computing," IEEE Signal Processing Magazine, Vol. 28, Issue 3, pp. 59-69, 2011.   DOI   ScienceOn
2 G.R. Blakley, "Safeguarding Cryptographic Keys," Proceedings of International Workshop on the National Computer Conference of IEEE Computer Society, pp. 313-317, 1979.
3 B. Grobauer, T. Walloschek, and E. Stocker, "Understanding Cloud Computing Vulnerabilities," IEEE Security and Privacy, Vol. 9, Issue 2, pp. 50-57, 2011.   DOI   ScienceOn
4 M. Lori, "Data Security in the World of Cloud Computing," IEEE Computer and Reliability Societies, Vol. 7, Issue 4, pp. 61-64, 2009.
5 A. Shamir, "How to Share a Secret," Communication of the ACM, Vol. 22, Issue 11, pp. 612-613, 1979.   DOI   ScienceOn
6 M. Naor and A. Shamir, "Visual Cryptography," Advances in Cryptology-EUROCRYPT'94, Lecture Notes in Computer Science 950, pp. 1-12, 1995.
7 C.C. Thien and J.C. Lin, "Secret Image Sharing," Journal of Computers and Graphics, Vol. 26, Issue 5, pp. 765-770, 2002.   DOI   ScienceOn
8 K.J. Kim, S.H. Shin, and K.Y. Yoo, "A New Information Data hiding Scheme based on Pattern Information of Secret Data," Journal of Korea Multimedia Society, Vol. 15, Issue 4, pp. 526-539, 2012.   과학기술학회마을   DOI   ScienceOn
9 S.I. Hyun, S.H. Shin, and K.Y. Yoo, "A Proactive Secret Image Sharing Scheme over GF(28)," Journal of Korea Multimedia Society, Vol. 16, Issue 5, pp. 577-590, 2013.   과학기술학회마을   DOI   ScienceOn
10 B.J. Jang, S.H. Lee, and K.R. Kwon, "Active Video Watermarking Technique for Infectious Information Hiding System," Journal of Korea Multimedia Society, Vol. 15, Issue 8, pp. 1017-1030, 2012.   과학기술학회마을   DOI   ScienceOn
11 D.R. Stinson, Cryptography: theory and practice, CRC Press, 2005, Upper Saddle River, NJ 07458, USA.
12 P.Y. Lin and C.S. Chan, "Invertible Secret Image Sharing with Steganography," Journal of Pattern Recognition Letters, Vol. 31, No. 13, pp. 1887-1893, 2010.   DOI
13 A. Menezes, P.C. van Oorschot, and S.A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1996, N.W., Boca Raton, FL 33431, USA.
14 M. Naor and A. Shamir, "Visual Cryptography II: Improving the Contrast Via the Cover Base," Proceedings of International Workshop Cambridge, Security Protocols, Lecture Notes in Computer Science 1189, pp. 197-202, 1997.
15 C.C. Lin and W.H. Tsai, "Secret Image Sharing with Steganography and Authentication," Journal of Systems and Software, Vol. 73, Issue 3, pp. 405-414, 2004.   DOI   ScienceOn
16 R.Z. Wang and S.J. Shyu, "Scalable Secret Image Sharing," Journal of Signal Processing: Image Communication, Vol. 22, Issue 4, pp. 363-373, 2007.   DOI
17 C.C. Chang, Y.P. Hsieh, and C.H. Lin, "Sharing Secrets in Stego Images with Authentication," Journal of Pattern Recognition, Vol. 41, Issue 10, pp. 3130-3137, 2008.   DOI