Computer Science ›› 2015, Vol. 42 ›› Issue (12): 251-256.

Previous Articles     Next Articles

Meaningful (K,N) Free Expansion Image Sharing Scheme Based on GF(23)

OUYANG Xian-bin and SHAO Li-ping   

  • Online:2018-11-14 Published:2018-11-14

Abstract: There is pixel expansion in conventional meaningful image sharing schemes which usually use short authentication information to verify the correctness of sharing information and bring defect that the facticity of the reconstructed secret image pixels cannot be accurately identified.To address these problems,a meaningful (K,N) free expansion ima-ge sharing scheme based on GF(23) was proposed.In the proposed scheme,firstly a key is used to generate an encryption mapping table and then this table and secret image pi-xel location information are used to encrypt secret image pixels.Secondly (K,N)-threshold scheme based on GF(23) is used to share the ciphered pixels and pixels authentication information and then they are embedded into N cover images.Finally the key which is used to generate encryption mapping table is also shared into N sub-keys by (K,N)-threshold scheme and the sub-keys’ MD5 values are published to the third reliable party to prevent cheating from distributed cover image holders.The experimental results show the proposed scheme can accurately detect attacked regions in reconstructed secret image.By comparing with conventional methods,the proposed scheme does not have any pixel expansion and distributed cover images have better visual quality.

Key words: Image sharing,Meaningful image sharing,(K,N)-threshold scheme,Gloise field,Free expansion

[1] Shamir A.How to share a secret[J].Communications of the Association for Computing Machinery,1979,22(11):612-613
[2] Blakley G R.Safeguarding cryptographic keys[C]∥Proceedings of 1979 National Computer Conference.New York,USA:AFIPS,1979:313-317
[3] Thien C C,Lin J C.Secret image sharing[J].Computers &Graphics,2002,26(5):765-770
[4] Chen C C,Fu W Y.A Geometry-based secret image sharing approach [J].Journal of Information Science and Engineering,2008,24(5):1567-1577
[5] Tso H K.Sharing secret images using Blakley’s concept[J].Optical Engineering.2008,47(7):0770011-0770013
[6] 吴小天,孙伟.基于误差扩散的图像分存方案[J].计算机应用,2011,31(1):74-77 Wu Xiao-tian,Sun Wei.Image sharing scheme based on error diffusion[J].Journal of Computer Applications,2011,1(1):74-77
[7] 欧锻灏,吴小天,孙伟,等.基于恢复函数和误差扩散的灰度图像分存方案[J].计算机科学,2013,40(2):112-116 Ou Duan-hao,Wu Xiao-tian,Sun Wei,et al.Secret gray-level image sharing scheme based on recovery function and error diffusion[J].Computer Science,2013,40(2):112-116
[8] Lin C C,Tsai W H.Secret image sharing with steganography and authentication[J].The Journal of Systems and Software,2004,73(3):405-414
[9] Yang C N,Chen T S,Yu K H,et al.Improvements of image sharing with steganography and authentication[J].The Journal of Systems and Software,2007,80(7):1070-1076
[10] Chang C C,Hsieh Y P,Lin C H.Sharing secrets in stego images with authentication[J].Pattern Recognition,2008,41(10):3130-3137
[11] Chang C C,Chen Y H,Wang H C.Meaningful secret sharing technique with authentication and remedy abilities[J].Information Sciences,2011,1(14):3073-3084
[12] Chen Y H,Chang C C.Image tamper detection and recovery based on dual watermarks sharing strategy[J].Journal of Digi-tal Information Management,2012,10(1):39-49
[13] Yang C N,Ouyang J F,Harn L.Steganography and authentication in image sharing without parity bits[J].Optics Communications,2012,285(7):1725-1735

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!