Abstract
For digital communication, distributed storage and management of media content over system holders is a critical issue. In this article, an efficient verifiable sharing scheme is proposed that can satisfy the significant essentials of distribution sharing and can achieve the lossless property of the host media. Verifiability allows holders to detect and identify the counterfeited shadows during cooperation in order to prevent cheaters. Only authorized holders can reveal the lossless shared content and then reconstruct the original host image. The shared media capacity is adjustable and proportional to the increase of t. The more distributed holders, the larger the shared media capacity. Moreover, the ability to reconstruct the image preserves the fidelity of valuable host media, such as military and medical images. According to the results, the proposed approach can achieve superior performance to that of related sharing schemes in order to effectively provide distributed media management and storage.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Blakley, G.R.: Safeguarding cryptographic keys. In: Proceedings of AFIPS National Computer Conference, vol. 48, pp. 313–317 (1979)
Shamir, A.: How to share a secret. Communications of the ACM 22(11), 612–613 (1979)
Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)
Beimel, A., Chor, B.: Secret sharing with public reconstruction. IEEE Transactions on Information Theory 44(5), 1887–1896 (1998)
Tompa, M., Woll, H.: How to share a secret with cheaters. Journal of Cryptology 1(2), 133–138 (1988)
Thien, C.C., Lin, J.C.: Secret image sharing. Computer & Graphics 26(1), 765–770 (2002)
Lee, C.C., Wu, H.C., Tsai, C.S., Chu, Y.P.: Adaptive lossless steganographic scheme with centralized difference expansion. Pattern Recognition 41(6), 2097–2106 (2008)
Wu, Y.S., Thien, C.C., Lin, J.C.: Sharing and hiding secret images with size constraint. Pattern Recognition 37(7), 1377–1385 (2004)
Lin, C.C., Tsai, W.H.: Secret image sharing with steganography and authentication. The Journal of Systems and Software 73(3), 405–414 (2004)
Yang, C.N., Chen, T.S., Yu, K.H., Wang, C.C.: Improvements of image sharing with steganography and authentication. The Journal of Systems and Software 80(7), 1070–1076 (2007)
Chang, C.C., Hsieh, Y.P., Lin, C.H.: Sharing secrets in stego images with authentication. Pattern Recognition 41(10), 3130–3137 (2008)
Eslami, Z., Razzaghi, S.H., Ahmadabadi, J.Z.: Secret image sharing based on cellular automata and steganography. Pattern Recognition 43(1), 397–404 (2010)
Chang, C.C., Chen, Y.H., Wang, H.C.: Meaningful secret sharing technique with authentication and remedy abilities. Information Sciences 181(14), 3073–3084 (2011)
Liu, T.Y., Tsai, W.H.: Generic lossless visible watermarking - a new approach. IEEE Transactions on Image Processing 19(5), 1224–1235 (2010)
Zeng, X.T., Ping, L.D., Pan, X.Z.: A lossless robust data hiding scheme. Pattern Recognition 43(4), 1656–1667 (2010)
Lin, P.Y., Lee, J.S., Chang, C.C.: Distortion-free secret image sharing mechanism using modulus operator. Pattern Recognition 42(5), 886–895 (2009)
Stinson, D.R.: Cryptography – Theory and Practice, 2nd edn. CRC Press Inc., New York (2002)
Ulutas, M., Ulutas, G., Nabiyev, V.V.: Medical image security and EPR hiding using Shamir’s secret sharing scheme. Journal of Systems and Software 84(3), 341–353 (2011)
Kundur, D., Hatzinakos, D.: Digital watermarking for telltale tamper proofing and authentication. IEEE Proceedings 87(7), 1167–1180 (1999)
Lu, C.S., Liao, H.Y.: Structural digital signature for image authentication: an incidental distortion resistant scheme. IEEE Transactions on Multimedia 5(2), 161–173 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lin, PY. (2011). Verifiable and Lossless Distributed Media Content Sharing. In: Hsu, CH., Yang, L.T., Ma, J., Zhu, C. (eds) Ubiquitous Intelligence and Computing. UIC 2011. Lecture Notes in Computer Science, vol 6905. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23641-9_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-23641-9_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-23640-2
Online ISBN: 978-3-642-23641-9
eBook Packages: Computer ScienceComputer Science (R0)