Browse > Article
http://dx.doi.org/10.9717/kmms.2015.18.11.1332

Reversible Secret Sharing Scheme Using Symmetric Key Encryption Algorithm in Encrypted Images  

Jeon, Byoung-Hyun (Dept. of Computer Info & Communication, Yeungjin Cyber College)
Shin, Sang-Ho (Realistic Media Result Product Promotion Group, Dongguk University Gyeongju Campus)
Jung, Ki-Hyun (Dept. of Cyber Security, Kyungil University)
Lee, Joon-Ho (6th R&D Institute, Agency for Defense Development)
Yoo, Kee-Young (School of Compuer Science and Engineering, Kyungpook National University)
Publication Information
Abstract
This paper proposes a novel reversible secret sharing scheme using AES algorithm in encrypted images. In the proposed scheme, a role of the dealer is divided into an image provider and a data hider. The image provider encrypts the cover image with a shared secret key and sends it to the dealer. The dealer embeds the secret data into the encrypted image and transmits encrypted shadow images to the corresponding participants. We utilize Galois polynomial arithmetic operation over 28 and the coefficient of the higher-order term is fixed to one in order to prevent the overflow. In experimental results, we demonstrate that the PSNR is sustained close to 44dB and the embedding capacity is 524,288 bits.
Keywords
Reversible Secret Image Sharing; Encrypted Images; Symmetric Key Encryption Algorithm; Information Hiding;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 F. Paul, "A Practical Scheme for Non-Interactive Verifiable Secret Sharing," Proceeding of 28th Annual Symposium on Foundations of Computer Science, pp. 427-438, 1987.
2 D.R. Stinson, Cryptography Theory and Practice, Chapman & Hall/CRC Press, United States of America, 2006.
3 S. William, Cryptography and Network Security, Prentice Hall, United States of America, 2006.
4 A.J. Menezes, P.C. Van Oorschot, and S.A. Vanstone, Handbook of Applied Cryptography, CRC Press, United States of America, 1996.
5 A. Shamir, “How to Share a Secret,” Communications of ACM, Vol. 22, No. 11, pp. 612-613, 1979.   DOI
6 I. Mitsuru, S. Akira, and N. Takao, "Secret Sharing Scheme Realizing General Access Structure," Electronics and Communications in Japan, Vol. 72, Issue 9, pp. 1520-6440, 1989.
7 S. Berry, "A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic Voting," Advances in Cryptology-CRYPTO'99 Lecture Notes in Computer Science, Vol. 1666, pp. 148-164, 1999.
8 B. Josh and L. Jerry, "Generalized Secret Sharing and Monotone Functions," Advances in Cryptology-CRYPTO'88 Lecture Notes in Computer Science, Vol. 403, pp. 27-35, 1990.
9 A. Beimel and B. Chor, “Secret Sharing with Public Reconstruction,” IEEE Transactions on Information Theory, Vol. 44, No. 5, pp. 1887-1896, 1998.   DOI
10 C. Thien and J. Lin, “Secret Image Sharing,” Computers & Graphics, Vol. 26, No. 5, pp. 765-770, 2002.   DOI
11 C. Thien and J. Lin, “An Image Sharing Method with User-friendly Shadow Images,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, No. 12, pp. 1161-1169, 2003.   DOI
12 C. Yang, T. Chen, K. Yu, and C. Wang, “Improvements of Image Sharing with Steganography and Authentication,” Journal of Systems & Software, Vol. 80, No. 7, pp. 1070-1076, 2007.   DOI
13 C. Lin and W. Tsai, “Secret Image Sharing with Steganography and Authentication,” Journal of Systems and Software, Vol. 73, No. 3, pp. 405-414, 2004.   DOI
14 U. Mustafa, G. Ulutas, and V.V. Nabiyev, “Invertible Secret Image Sharing for Gray Level and Dithered Cover Images,” Journal of Systems and Software, Vol. 86, No. 2, pp. 485-500, 2013.   DOI
15 R. Wang and S. Shyu, “Scalable Secret Image Sharing,” Journal of Signal Processing: Image Communication, Vol. 22, No. 4, pp. 363-373, 2007.   DOI
16 C. Chang, Y. Hsieh, and C. Lin, “Sharing Secrets in Stego Images with Authentication,” Journal of Pattern Recognition, Vol. 41, No. 10, pp. 3130-3137, 2008.   DOI
17 C. Lin, L. Liao, K. Hwang, and S. Chen, “Reversible Secret Image Sharing with High Visual Quality,” Multimedia Tools and Applications, Vol. 70, No. 3, pp. 1729-1747, 2014.   DOI
18 B. Jeon, G. Lee, K. Jung and K. Yoo, “Reversible Secret Image Sharing Scheme Using Histogram Shifting and Difference Expansion,” Journal of Korea Multimedia Society, Vol. 17, No. 7, pp. 849-857, 2014.   DOI
19 X. Zhang, “Reversible Data Hiding in Encrypted Image,” IEEE Signal Processing Letters, Vol. 18, No. 4 pp. 255-258, 2011.   DOI
20 W. Hong, T. Chen, and H. Wu, “An Improved Reversible Data Hiding in Encrypted Images using Side Match,” IEEE Signal Processing Letters, Vol. 19, No. 4 pp. 199-202, 2012.   DOI
21 B. Jang, S. Lee, and K. Kwon, “Active Video Watermarking Technique for Infectious Information Hiding System,” Journal of Korea Multimedia Society, Vol. 15, No. 8, pp. 1017-1030, 2012   DOI
22 S. Hyun, S. Shin, and K. Yoo, “A Proactive Secret Image Sharing Scheme over GF(28),” Journal of Korea Multimedia Society, Vol. 16, No. 5, pp. 577-590, 2013.   DOI