Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Fake and Dishonest Participant Immune Secret Image Sharing

Published: 27 February 2023 Publication History

Abstract

Secret image sharing (SIS) has received increased attention from the research community because of its usefulness in multiparty secure computing, access control, blockchain distributive storage and other security-oriented applications. Prevention of fake and dishonest participants is a key issue that has spurred interest in practical applications of SIS. Unfortunately, most previous SIS schemes failed to detect and locate fake or dishonest participants. In this article, an SIS for a  (k,n)-threshold without pixel expansion is presented, which can detect and locate both fake and dishonest participants. Using a screening operation, the proposed approach fuses the benefits of polynomial-based SIS, visual cryptographic scheme (VCS), and hash functions to authenticate separate participants both with and without a dealer. In addition, the proposed approach achieves lossless rebuilding of the secret image. Analyses and experiments are conducted in this study to establish the effectiveness of the presented approach.

References

[1]
Chin-Chen Chang, Yi-Pei Hsieh, and Chia-Hsuan Lin. 2008. Sharing secrets in stego images with authentication. Pattern Recognition 41, 10 (2008), 3130–3137.
[2]
Yuqiao Cheng, Zhengxin Fu, and Bin Yu. 2018. Improved visual secret sharing scheme for QR code applications. IEEE Transactions on Information Forensics and Security 13, 9 (2018), 2393–2403.
[3]
Roberto De Prisco and Alfredo De Santis. 2014. On the relation of random grid and deterministic visual cryptography. IEEE Transactions on Information Forensics and Security 9, 4 (2014), 653–665.
[4]
Ahmed A. Abd El-Latif, Bassem Abd-El-Atty, Wojciech Mazurczyk, Carol Fung, and Salvador Elias Venegas-Andraca. 2020. Secure data encryption based on quantum walks for 5G Internet of Things scenario. IEEE Transactions on Network and Service Management 17, 1 (2020), 118–131.
[5]
Zheng-xin Fu and Bin Yu. 2014. Visual cryptography and random grids schemes. In Digital-Forensics and Watermarking. Springer, Auckland, New Zealand, 109–122.
[6]
M. Fukumitsu, S. Hasegawa, J. Iwazaki, M. Sakai, and D. Takahashi. 2017. A proposal of a secure P2P-Type storage scheme by using the secret sharing and the blockchain. In 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA’17). 803–810.
[7]
Teng Guo, Feng Liu, and ChuanKun Wu. 2013. Threshold visual secret sharing by random grids with improved contrast. Journal of Systems and Software 86, 8 (2013), 2094–2109.
[8]
Xingxing Jia, Daoshun Wang, Daxin Nie, Xiangyang Luo, and Jonathan Zheng Sun. 2019. A new threshold changeable secret sharing scheme based on the Chinese Remainder Theorem. Information Sciences 473 (2019), 13–30.
[9]
Ruiqi Jiang, Hang Zhou, Weiming Zhang, and Nenghai Yu. 2018. Reversible data hiding in encrypted three-dimensional mesh models. IEEE Transactions on Multimedia 20, 1 (2018), 55–67.
[10]
Yue Jiang, Xuehu Yan, Jianqing Qi, Yuliang Lu, and Xuan Zhou. 2020. Image sharing with dealer-participatory and non-dealer-participatory mutual shadow authentication capabilities. Mathematics 8, 2 (2020), 234.
[11]
Oded Kafri and Eliezer Keren. 1987. Encryption of pictures and shapes by random grids. Optics Letters 12, 6 (1987), 377–379.
[12]
Ilan Komargodski, Moni Naor, and Eylon Yogev. 2017. Secret-sharing for NP. Journal of Cryptology 30, 2 (2017), 444–469. arxiv:1403.5698
[13]
Li Li, M. Shamim Hossain, Ahmed A. Abd El-Latif, and M. F. Alhamid. 2017. Distortion less secret image sharing scheme for Internet of Things system. Cluster Computing (30 Nov.2017).
[14]
Peng Li, Jianfeng Ma, and Quan Ma. 2020. (t, k, n) XOR-based visual cryptography scheme with essential shadows. Journal of Visual Communication and Image Representation 72 (102020), 102911.
[15]
P. Li, P. Ma, and X. Su. 2010. Image secret sharing and hiding with authentication. In 2010 First International Conference on Pervasive Computing, Signal Processing and Applications. 367–370.
[16]
Y. Li and L. Guo. 2018. Robust image fingerprinting via distortion-resistant sparse coding. IEEE Signal Processing Letters 25, 1 (Jan.2018), 140–144.
[17]
Chang-Chou Lin and Wen-Hsiang Tsai. 2004. Secret image sharing with steganography and authentication. Journal of Systems and Software 73, 3 (2004), 405–414.
[18]
Jingju Liu, Lei Sun, Jinrui Liu, and Xuehu Yan. 2021. Fake and Dishonest Participant Location Scheme in Secret Image Sharing. 2473 pages.
[19]
Yanjun Liu and Chin-Chen Chang. 2018. A turtle shell-based visual secret sharing scheme with reversibility and authentication. Multimedia Tools and Applications 77, 19 (01 Oct.2018), 25295–25310.
[20]
Yanxiao Liu, Chingnung Yang, Yichuan Wang, Lei Zhu, and Wenjiang Ji. 2018b. Cheating identifiable secret sharing scheme using symmetric bivariate polynomial. Information Sciences 453 (2018), 21–29.
[21]
Yan-Xiao Liu, Qin-Dong Sun, and Ching-Nung Yang. 2018a. (k,n) secret image sharing scheme capable of cheating detection. EURASIP Journal on Wireless Communications and Networking 2018, 1 (02 Apr.2018), 72.
[22]
Zuquan Liu, Guopu Zhu, Yuan-Gen Wang, Jianquan Yang, and Sam Kwong. 2020. A novel (t, s, k, n)-threshold visual secret sharing scheme based on access structure partition. ACM Trans. Multimedia Comput. Commun. Appl. 16, 4, Article 118 (Dec.2020), 21 pages.
[23]
Manoranjan Mohanty, Wei Tsang Ooi, and Pradeep K. Atrey. 2013. Secure cloud-based volume ray-casting. In 2013 IEEE 5th International Conference on Cloud Computing Technology and Science, Vol. 1. 531–538.
[24]
Moni Naor and Adi Shamir. 1995. Visual cryptography. In Advances in Cryptology-EUROCRYPT’94 Lecture Notes in Computer Science, Workshop on the Theory and Application of Cryptographic Techniques, May 9–12. Springer, Perugia, Italy, 1–12.
[25]
N. Peri, N. Gupta, W. R. Huang, L. Fowl, C. Zhu, S. Feizi, T. Goldstein, and J. P. Dickerson. 2020. Deep k-NN Defense Against Clean-Label Data Poisoning Attacks. European Conference on Computer Vision.
[26]
Z. Qian, X. Zhang, and S. Wang. 2014. Reversible data hiding in encrypted JPEG bitstream. IEEE Transactions on Multimedia 16, 5 (Aug.2014), 1486–1491.
[27]
Adi Shamir. 1979. How to share a secret. Commun. ACM 22, 11 (1979), 612–613.
[28]
Shivendra Shivani and Suneeta Agarwal. 2016. Progressive visual cryptography with unexpanded meaningful shares. ACM Trans. Multimedia Comput. Commun. Appl. 12, 4, Article 50 (Aug.2016), 24 pages.
[29]
Chih-Ching Thien and Ja-Chen Lin. 2002. Secret image sharing. Computers & Graphics 26, 5 (2002), 765–770.
[30]
Guzin Ulutas, Mustafa Ulutas, and Vasif V. Nabiyev. 2013. Secret image sharing scheme with adaptive authentication strength. Pattern Recognition Letters 34, 3 (2013), 283–291.
[31]
Ping Wang, Xing He, Yushu Zhang, Wenying Wen, and Ming Li. 2019. A robust and secure image sharing scheme with personal identity information embedded. Computers & Security 85 (2019), 107–121.
[32]
Zhongmin Wang, Gonzalo R. Arce, and Giovanni Di Crescenzo. 2009. Halftone visual cryptography via error diffusion. IEEE Trans. Inf. Forensics Security. 4, 3 (2009), 383–396.
[33]
Jonathan Weir and WeiQi Yan. 2010. A comprehensive study of visual cryptography. In Transactions on DHMS V, LNCS 6010, Springer-Verlag, Vol. 5. Springer, Berlin, 70–105.
[34]
Jonathan Weir, Weiqi Yan, and Mohan S. Kankanhalli. 2012. Image hatching for visual cryptography. ACM Trans. Multimedia Comput. Commun. Appl. 8, 2S, Article 32 (Sept.2012), 15 pages.
[35]
Lizhi Xiong, Xinwei Zhong, Ching-Nung Yang, and Xiao Han. 2021. Transform domain-based invertible and lossless secret image sharing with authentication. IEEE Transactions on Information Forensics and Security PP (032021), 1–1.
[36]
Xuehu Yan, Qinghong Gong, Longlong Li, Guozheng Yang, Yuliang Lu, and Jingju Liu. 2020. Secret image sharing with separate shadow authentication ability. Signal Processing: Image Communication 82 (2020), 115721.
[37]
Xuehu Yan, Xin Liu, and Ching-Nung Yang. 2018. An enhanced threshold visual secret sharing based on random grids. Journal of Real-Time Image Processing 14, 1 (01 Jan.2018), 61–73.
[38]
Xuehu Yan, Yuliang Lu, Ching-Nung Yang, Xinpeng Zhang, and Shudong Wang. 2021. A common method of share authentication in image secret sharing. IEEE Transactions on Circuits and Systems for Video Technology 31, 7 (2021), 2896–2908.
[39]
Ching-Nung Yang, Chih-Cheng Wu, and Dao-Shun Wang. 2014. A discussion on the relationship between probabilistic visual cryptography and random grid. Information Sciences 278 (2014), 141–173.
[40]
Zhaoxia Yin, Youzhi Xiang, and Xinpeng Zhang. 2020. Reversible data hiding in encrypted images based on multi-MSB prediction and Huffman coding. IEEE Transactions on Multimedia 22, 4 (2020), 874–884.
[41]
Yi Zhang, Chuan Qin, Weiming Zhang, Fenlin Liu, and Xiangyang Luo. 2018. On the fault-tolerant performance for a class of robust image steganography. Signal Processing 146 (2018), 99–111.
[42]
Hang Zhou, Kejiang Chen, Weiming Zhang, Yuanzhi Yao, and Nenghai Yu. 2019. Distortion design for secure adaptive 3-D mesh steganography. IEEE Transactions on Multimedia 21, 6 (2019), 1384–1398.
[43]
Z. Zhou, C. Yang, Y. Cao, and X. Sun. 2018. Secret image sharing based on encrypted pixels. IEEE Access 6 (2018), 15021–15025.

Cited By

View all
  • (2024)Suitable and Style-Consistent Multi-Texture Recommendation for Cartoon IllustrationsACM Transactions on Multimedia Computing, Communications, and Applications10.1145/365251820:7(1-26)Online publication date: 16-May-2024
  • (2024)DiffFashion: Reference-Based Fashion Design With Structure-Aware Transfer by Diffusion ModelsIEEE Transactions on Multimedia10.1109/TMM.2023.331829726(3962-3975)Online publication date: 1-Jan-2024
  • (2024)SISS‐CSA: Secret image sharing scheme with ciphertext‐based share authentication for malicious modelSoftware: Practice and Experience10.1002/spe.3359Online publication date: 18-Jun-2024

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Multimedia Computing, Communications, and Applications
ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 19, Issue 4
July 2023
263 pages
ISSN:1551-6857
EISSN:1551-6865
DOI:10.1145/3582888
  • Editor:
  • Abdulmotaleb El Saddik
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 27 February 2023
Online AM: 24 November 2022
Accepted: 20 November 2022
Revised: 11 November 2022
Received: 30 December 2021
Published in TOMM Volume 19, Issue 4

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Secret image sharing
  2. hash function
  3. participant authentication
  4. no pixel expansion

Qualifiers

  • Research-article

Funding Sources

  • National Natural Science Foundation of China

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)123
  • Downloads (Last 6 weeks)11
Reflects downloads up to 18 Aug 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Suitable and Style-Consistent Multi-Texture Recommendation for Cartoon IllustrationsACM Transactions on Multimedia Computing, Communications, and Applications10.1145/365251820:7(1-26)Online publication date: 16-May-2024
  • (2024)DiffFashion: Reference-Based Fashion Design With Structure-Aware Transfer by Diffusion ModelsIEEE Transactions on Multimedia10.1109/TMM.2023.331829726(3962-3975)Online publication date: 1-Jan-2024
  • (2024)SISS‐CSA: Secret image sharing scheme with ciphertext‐based share authentication for malicious modelSoftware: Practice and Experience10.1002/spe.3359Online publication date: 18-Jun-2024

View Options

Get Access

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Full Text

View this article in Full Text.

Full Text

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media