Abstract
Secret image sharing (SIS) has received increased attention from the research community because of its usefulness in multiparty secure computing, access control, blockchain distributive storage and other security-oriented applications. Prevention of fake and dishonest participants is a key issue that has spurred interest in practical applications of SIS. Unfortunately, most previous SIS schemes failed to detect and locate fake or dishonest participants. In this article, an SIS for a (k,n)-threshold without pixel expansion is presented, which can detect and locate both fake and dishonest participants. Using a screening operation, the proposed approach fuses the benefits of polynomial-based SIS, visual cryptographic scheme (VCS), and hash functions to authenticate separate participants both with and without a dealer. In addition, the proposed approach achieves lossless rebuilding of the secret image. Analyses and experiments are conducted in this study to establish the effectiveness of the presented approach.
- . 2008. Sharing secrets in stego images with authentication. Pattern Recognition 41, 10 (2008), 3130–3137.Google Scholar
Digital Library
- . 2018. Improved visual secret sharing scheme for QR code applications. IEEE Transactions on Information Forensics and Security 13, 9 (2018), 2393–2403.Google Scholar
Digital Library
- . 2014. On the relation of random grid and deterministic visual cryptography. IEEE Transactions on Information Forensics and Security 9, 4 (2014), 653–665.Google Scholar
Digital Library
- . 2020. Secure data encryption based on quantum walks for 5G Internet of Things scenario. IEEE Transactions on Network and Service Management 17, 1 (2020), 118–131.Google Scholar
Digital Library
- . 2014. Visual cryptography and random grids schemes. In Digital-Forensics and Watermarking. Springer, Auckland, New Zealand, 109–122.Google Scholar
Cross Ref
- . 2017. A proposal of a secure P2P-Type storage scheme by using the secret sharing and the blockchain. In 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA’17). 803–810.Google Scholar
Cross Ref
- . 2013. Threshold visual secret sharing by random grids with improved contrast. Journal of Systems and Software 86, 8 (2013), 2094–2109.Google Scholar
Digital Library
- . 2019. A new threshold changeable secret sharing scheme based on the Chinese Remainder Theorem. Information Sciences 473 (2019), 13–30.Google Scholar
Cross Ref
- . 2018. Reversible data hiding in encrypted three-dimensional mesh models. IEEE Transactions on Multimedia 20, 1 (2018), 55–67.Google Scholar
Digital Library
- . 2020. Image sharing with dealer-participatory and non-dealer-participatory mutual shadow authentication capabilities. Mathematics 8, 2 (2020), 234.Google Scholar
Cross Ref
- . 1987. Encryption of pictures and shapes by random grids. Optics Letters 12, 6 (1987), 377–379.Google Scholar
- . 2017. Secret-sharing for NP. Journal of Cryptology 30, 2 (2017), 444–469.
arxiv:1403.5698 Google ScholarDigital Library
- . 2017. Distortion less secret image sharing scheme for Internet of Things system. Cluster Computing (
30 Nov. 2017).Google Scholar - . 2020. (t, k, n) XOR-based visual cryptography scheme with essential shadows. Journal of Visual Communication and Image Representation 72 (
10 2020), 102911.Google ScholarCross Ref
- . 2010. Image secret sharing and hiding with authentication. In 2010 First International Conference on Pervasive Computing, Signal Processing and Applications. 367–370.Google Scholar
Digital Library
- . 2018. Robust image fingerprinting via distortion-resistant sparse coding. IEEE Signal Processing Letters 25, 1 (
Jan. 2018), 140–144.Google ScholarCross Ref
- . 2004. Secret image sharing with steganography and authentication. Journal of Systems and Software 73, 3 (2004), 405–414.Google Scholar
Digital Library
- . 2021. Fake and Dishonest Participant Location Scheme in Secret Image Sharing. 2473 pages.Google Scholar
- . 2018. A turtle shell-based visual secret sharing scheme with reversibility and authentication. Multimedia Tools and Applications 77, 19 (
01 Oct. 2018), 25295–25310.Google ScholarDigital Library
- . 2018b. Cheating identifiable secret sharing scheme using symmetric bivariate polynomial. Information Sciences 453 (2018), 21–29.Google Scholar
Cross Ref
- . 2018a. (k,n) secret image sharing scheme capable of cheating detection. EURASIP Journal on Wireless Communications and Networking 2018, 1 (
02 Apr. 2018), 72.Google ScholarCross Ref
- . 2020. A novel (t, s, k, n)-threshold visual secret sharing scheme based on access structure partition. ACM Trans. Multimedia Comput. Commun. Appl. 16, 4, Article
118 (Dec. 2020), 21 pages.Google ScholarDigital Library
- . 2013. Secure cloud-based volume ray-casting. In 2013 IEEE 5th International Conference on Cloud Computing Technology and Science, Vol. 1. 531–538.Google Scholar
Digital Library
- . 1995. Visual cryptography. In Advances in Cryptology-EUROCRYPT’94 Lecture Notes in Computer Science, Workshop on the Theory and Application of Cryptographic Techniques, May 9–12. Springer, Perugia, Italy, 1–12.Google Scholar
- . 2020. Deep k-NN Defense Against Clean-Label Data Poisoning Attacks. European Conference on Computer Vision.Google Scholar
Digital Library
- . 2014. Reversible data hiding in encrypted JPEG bitstream. IEEE Transactions on Multimedia 16, 5 (
Aug. 2014), 1486–1491.Google ScholarCross Ref
- . 1979. How to share a secret. Commun. ACM 22, 11 (1979), 612–613.Google Scholar
Digital Library
- . 2016. Progressive visual cryptography with unexpanded meaningful shares. ACM Trans. Multimedia Comput. Commun. Appl. 12, 4, Article
50 (Aug. 2016), 24 pages.Google ScholarDigital Library
- . 2002. Secret image sharing. Computers & Graphics 26, 5 (2002), 765–770.Google Scholar
- . 2013. Secret image sharing scheme with adaptive authentication strength. Pattern Recognition Letters 34, 3 (2013), 283–291.Google Scholar
Digital Library
- . 2019. A robust and secure image sharing scheme with personal identity information embedded. Computers & Security 85 (2019), 107–121.Google Scholar
Digital Library
- . 2009. Halftone visual cryptography via error diffusion. IEEE Trans. Inf. Forensics Security. 4, 3 (2009), 383–396.Google Scholar
Digital Library
- . 2010. A comprehensive study of visual cryptography. In Transactions on DHMS V, LNCS 6010, Springer-Verlag, Vol. 5. Springer, Berlin, 70–105.Google Scholar
- . 2012. Image hatching for visual cryptography. ACM Trans. Multimedia Comput. Commun. Appl. 8, 2S, Article
32 (Sept. 2012), 15 pages.Google ScholarDigital Library
- . 2021. Transform domain-based invertible and lossless secret image sharing with authentication. IEEE Transactions on Information Forensics and Security PP (
03 2021), 1–1.Google Scholar - . 2020. Secret image sharing with separate shadow authentication ability. Signal Processing: Image Communication 82 (2020), 115721.Google Scholar
Digital Library
- . 2018. An enhanced threshold visual secret sharing based on random grids. Journal of Real-Time Image Processing 14, 1 (
01 Jan. 2018), 61–73.Google ScholarCross Ref
- . 2021. A common method of share authentication in image secret sharing. IEEE Transactions on Circuits and Systems for Video Technology 31, 7 (2021), 2896–2908.Google Scholar
Cross Ref
- . 2014. A discussion on the relationship between probabilistic visual cryptography and random grid. Information Sciences 278 (2014), 141–173.Google Scholar
Cross Ref
- . 2020. Reversible data hiding in encrypted images based on multi-MSB prediction and Huffman coding. IEEE Transactions on Multimedia 22, 4 (2020), 874–884.Google Scholar
Digital Library
- . 2018. On the fault-tolerant performance for a class of robust image steganography. Signal Processing 146 (2018), 99–111.Google Scholar
Cross Ref
- . 2019. Distortion design for secure adaptive 3-D mesh steganography. IEEE Transactions on Multimedia 21, 6 (2019), 1384–1398.Google Scholar
Digital Library
- . 2018. Secret image sharing based on encrypted pixels. IEEE Access 6 (2018), 15021–15025.Google Scholar
Cross Ref
Index Terms
Fake and Dishonest Participant Immune Secret Image Sharing
Recommendations
A new Boolean-based multiple secret image sharing scheme to share different sized secret images
The proposed Boolean-based multiple secret image sharing technique can share many secret images among participants using low computational Boolean operations. Previous studies dealt with sharing identically sized secret images; however, secret images ...
An efficient verifiable (t,n)-threshold secret image sharing scheme with ultralight shares
AbstractA secret sharing scheme partitions a secret into a set of shares and distributes them among the eligible participants, with each participant receiving one share of the secret. The sharing technique allows any qualified subset of participants to ...
Enhanced Boolean-based multi secret image sharing scheme
Recently, Chen and Wu propose a (n, n) multi secret image sharing (MSIS) scheme that shares n secret images into n shared images. These n shared images can be together used for reconstructing n secret images by Boolean operations. However, there is an ...






Comments