skip to main content
research-article

Fake and Dishonest Participant Immune Secret Image Sharing

Published:27 February 2023Publication History
Skip Abstract Section

Abstract

Secret image sharing (SIS) has received increased attention from the research community because of its usefulness in multiparty secure computing, access control, blockchain distributive storage and other security-oriented applications. Prevention of fake and dishonest participants is a key issue that has spurred interest in practical applications of SIS. Unfortunately, most previous SIS schemes failed to detect and locate fake or dishonest participants. In this article, an SIS for a  (k,n)-threshold without pixel expansion is presented, which can detect and locate both fake and dishonest participants. Using a screening operation, the proposed approach fuses the benefits of polynomial-based SIS, visual cryptographic scheme (VCS), and hash functions to authenticate separate participants both with and without a dealer. In addition, the proposed approach achieves lossless rebuilding of the secret image. Analyses and experiments are conducted in this study to establish the effectiveness of the presented approach.

REFERENCES

  1. Chang Chin-Chen, Hsieh Yi-Pei, and Lin Chia-Hsuan. 2008. Sharing secrets in stego images with authentication. Pattern Recognition 41, 10 (2008), 31303137.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Cheng Yuqiao, Fu Zhengxin, and Yu Bin. 2018. Improved visual secret sharing scheme for QR code applications. IEEE Transactions on Information Forensics and Security 13, 9 (2018), 23932403.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Prisco Roberto De and Santis Alfredo De. 2014. On the relation of random grid and deterministic visual cryptography. IEEE Transactions on Information Forensics and Security 9, 4 (2014), 653665.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. El-Latif Ahmed A. Abd, Abd-El-Atty Bassem, Mazurczyk Wojciech, Fung Carol, and Venegas-Andraca Salvador Elias. 2020. Secure data encryption based on quantum walks for 5G Internet of Things scenario. IEEE Transactions on Network and Service Management 17, 1 (2020), 118131.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Fu Zheng-xin and Yu Bin. 2014. Visual cryptography and random grids schemes. In Digital-Forensics and Watermarking. Springer, Auckland, New Zealand, 109122.Google ScholarGoogle ScholarCross RefCross Ref
  6. Fukumitsu M., Hasegawa S., Iwazaki J., Sakai M., and Takahashi D.. 2017. A proposal of a secure P2P-Type storage scheme by using the secret sharing and the blockchain. In 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA’17). 803810.Google ScholarGoogle ScholarCross RefCross Ref
  7. Guo Teng, Liu Feng, and Wu ChuanKun. 2013. Threshold visual secret sharing by random grids with improved contrast. Journal of Systems and Software 86, 8 (2013), 20942109.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Jia Xingxing, Wang Daoshun, Nie Daxin, Luo Xiangyang, and Sun Jonathan Zheng. 2019. A new threshold changeable secret sharing scheme based on the Chinese Remainder Theorem. Information Sciences 473 (2019), 1330.Google ScholarGoogle ScholarCross RefCross Ref
  9. Jiang Ruiqi, Zhou Hang, Zhang Weiming, and Yu Nenghai. 2018. Reversible data hiding in encrypted three-dimensional mesh models. IEEE Transactions on Multimedia 20, 1 (2018), 5567.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Jiang Yue, Yan Xuehu, Qi Jianqing, Lu Yuliang, and Zhou Xuan. 2020. Image sharing with dealer-participatory and non-dealer-participatory mutual shadow authentication capabilities. Mathematics 8, 2 (2020), 234.Google ScholarGoogle ScholarCross RefCross Ref
  11. Kafri Oded and Keren Eliezer. 1987. Encryption of pictures and shapes by random grids. Optics Letters 12, 6 (1987), 377379.Google ScholarGoogle Scholar
  12. Komargodski Ilan, Naor Moni, and Yogev Eylon. 2017. Secret-sharing for NP. Journal of Cryptology 30, 2 (2017), 444469. arxiv:1403.5698Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Li Li, Hossain M. Shamim, El-Latif Ahmed A. Abd, and Alhamid M. F.. 2017. Distortion less secret image sharing scheme for Internet of Things system. Cluster Computing (30 Nov.2017).Google ScholarGoogle Scholar
  14. Li Peng, Ma Jianfeng, and Ma Quan. 2020. (t, k, n) XOR-based visual cryptography scheme with essential shadows. Journal of Visual Communication and Image Representation 72 (102020), 102911.Google ScholarGoogle ScholarCross RefCross Ref
  15. Li P., Ma P., and Su X.. 2010. Image secret sharing and hiding with authentication. In 2010 First International Conference on Pervasive Computing, Signal Processing and Applications. 367370.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Li Y. and Guo L.. 2018. Robust image fingerprinting via distortion-resistant sparse coding. IEEE Signal Processing Letters 25, 1 (Jan.2018), 140144.Google ScholarGoogle ScholarCross RefCross Ref
  17. Lin Chang-Chou and Tsai Wen-Hsiang. 2004. Secret image sharing with steganography and authentication. Journal of Systems and Software 73, 3 (2004), 405414.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Liu Jingju, Sun Lei, Liu Jinrui, and Yan Xuehu. 2021. Fake and Dishonest Participant Location Scheme in Secret Image Sharing. 2473 pages.Google ScholarGoogle Scholar
  19. Liu Yanjun and Chang Chin-Chen. 2018. A turtle shell-based visual secret sharing scheme with reversibility and authentication. Multimedia Tools and Applications 77, 19 (01 Oct.2018), 2529525310.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Liu Yanxiao, Yang Chingnung, Wang Yichuan, Zhu Lei, and Ji Wenjiang. 2018b. Cheating identifiable secret sharing scheme using symmetric bivariate polynomial. Information Sciences 453 (2018), 2129.Google ScholarGoogle ScholarCross RefCross Ref
  21. Liu Yan-Xiao, Sun Qin-Dong, and Yang Ching-Nung. 2018a. (k,n) secret image sharing scheme capable of cheating detection. EURASIP Journal on Wireless Communications and Networking 2018, 1 (02 Apr.2018), 72.Google ScholarGoogle ScholarCross RefCross Ref
  22. Liu Zuquan, Zhu Guopu, Wang Yuan-Gen, Yang Jianquan, and Kwong Sam. 2020. A novel (t, s, k, n)-threshold visual secret sharing scheme based on access structure partition. ACM Trans. Multimedia Comput. Commun. Appl. 16, 4, Article 118 (Dec.2020), 21 pages.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Mohanty Manoranjan, Ooi Wei Tsang, and Atrey Pradeep K.. 2013. Secure cloud-based volume ray-casting. In 2013 IEEE 5th International Conference on Cloud Computing Technology and Science, Vol. 1. 531538.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Naor Moni and Shamir Adi. 1995. Visual cryptography. In Advances in Cryptology-EUROCRYPT’94 Lecture Notes in Computer Science, Workshop on the Theory and Application of Cryptographic Techniques, May 9–12. Springer, Perugia, Italy, 112.Google ScholarGoogle Scholar
  25. Peri N., Gupta N., Huang W. R., Fowl L., Zhu C., Feizi S., Goldstein T., and Dickerson J. P.. 2020. Deep k-NN Defense Against Clean-Label Data Poisoning Attacks. European Conference on Computer Vision.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Qian Z., Zhang X., and Wang S.. 2014. Reversible data hiding in encrypted JPEG bitstream. IEEE Transactions on Multimedia 16, 5 (Aug.2014), 14861491.Google ScholarGoogle ScholarCross RefCross Ref
  27. Shamir Adi. 1979. How to share a secret. Commun. ACM 22, 11 (1979), 612613.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Shivani Shivendra and Agarwal Suneeta. 2016. Progressive visual cryptography with unexpanded meaningful shares. ACM Trans. Multimedia Comput. Commun. Appl. 12, 4, Article 50 (Aug.2016), 24 pages.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Thien Chih-Ching and Lin Ja-Chen. 2002. Secret image sharing. Computers & Graphics 26, 5 (2002), 765770.Google ScholarGoogle Scholar
  30. Ulutas Guzin, Ulutas Mustafa, and Nabiyev Vasif V.. 2013. Secret image sharing scheme with adaptive authentication strength. Pattern Recognition Letters 34, 3 (2013), 283291.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Wang Ping, He Xing, Zhang Yushu, Wen Wenying, and Li Ming. 2019. A robust and secure image sharing scheme with personal identity information embedded. Computers & Security 85 (2019), 107121.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Wang Zhongmin, Arce Gonzalo R., and Crescenzo Giovanni Di. 2009. Halftone visual cryptography via error diffusion. IEEE Trans. Inf. Forensics Security. 4, 3 (2009), 383396.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Weir Jonathan and Yan WeiQi. 2010. A comprehensive study of visual cryptography. In Transactions on DHMS V, LNCS 6010, Springer-Verlag, Vol. 5. Springer, Berlin, 70105.Google ScholarGoogle Scholar
  34. Weir Jonathan, Yan Weiqi, and Kankanhalli Mohan S.. 2012. Image hatching for visual cryptography. ACM Trans. Multimedia Comput. Commun. Appl. 8, 2S, Article 32 (Sept.2012), 15 pages.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Xiong Lizhi, Zhong Xinwei, Yang Ching-Nung, and Han Xiao. 2021. Transform domain-based invertible and lossless secret image sharing with authentication. IEEE Transactions on Information Forensics and Security PP (032021), 11.Google ScholarGoogle Scholar
  36. Yan Xuehu, Gong Qinghong, Li Longlong, Yang Guozheng, Lu Yuliang, and Liu Jingju. 2020. Secret image sharing with separate shadow authentication ability. Signal Processing: Image Communication 82 (2020), 115721.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Yan Xuehu, Liu Xin, and Yang Ching-Nung. 2018. An enhanced threshold visual secret sharing based on random grids. Journal of Real-Time Image Processing 14, 1 (01 Jan.2018), 6173.Google ScholarGoogle ScholarCross RefCross Ref
  38. Yan Xuehu, Lu Yuliang, Yang Ching-Nung, Zhang Xinpeng, and Wang Shudong. 2021. A common method of share authentication in image secret sharing. IEEE Transactions on Circuits and Systems for Video Technology 31, 7 (2021), 28962908.Google ScholarGoogle ScholarCross RefCross Ref
  39. Yang Ching-Nung, Wu Chih-Cheng, and Wang Dao-Shun. 2014. A discussion on the relationship between probabilistic visual cryptography and random grid. Information Sciences 278 (2014), 141173.Google ScholarGoogle ScholarCross RefCross Ref
  40. Yin Zhaoxia, Xiang Youzhi, and Zhang Xinpeng. 2020. Reversible data hiding in encrypted images based on multi-MSB prediction and Huffman coding. IEEE Transactions on Multimedia 22, 4 (2020), 874884.Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Zhang Yi, Qin Chuan, Zhang Weiming, Liu Fenlin, and Luo Xiangyang. 2018. On the fault-tolerant performance for a class of robust image steganography. Signal Processing 146 (2018), 99111.Google ScholarGoogle ScholarCross RefCross Ref
  42. Zhou Hang, Chen Kejiang, Zhang Weiming, Yao Yuanzhi, and Yu Nenghai. 2019. Distortion design for secure adaptive 3-D mesh steganography. IEEE Transactions on Multimedia 21, 6 (2019), 13841398.Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Zhou Z., Yang C., Cao Y., and Sun X.. 2018. Secret image sharing based on encrypted pixels. IEEE Access 6 (2018), 1502115025.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Fake and Dishonest Participant Immune Secret Image Sharing

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image ACM Transactions on Multimedia Computing, Communications, and Applications
            ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 19, Issue 4
            July 2023
            263 pages
            ISSN:1551-6857
            EISSN:1551-6865
            DOI:10.1145/3582888
            • Editor:
            • Abdulmotaleb El Saddik
            Issue’s Table of Contents

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 27 February 2023
            • Online AM: 24 November 2022
            • Accepted: 20 November 2022
            • Revised: 11 November 2022
            • Received: 30 December 2021
            Published in tomm Volume 19, Issue 4

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
          • Article Metrics

            • Downloads (Last 12 months)126
            • Downloads (Last 6 weeks)12

            Other Metrics

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          Full Text

          View this article in Full Text.

          View Full Text

          HTML Format

          View this article in HTML Format .

          View HTML Format
          About Cookies On This Site

          We use cookies to ensure that we give you the best experience on our website.

          Learn more

          Got it!