Skip to main content

A (2, 2) Secret Sharing Scheme Based on Hamming Code and AMBTC

  • Conference paper
Intelligent Information and Database Systems (ACIIDS 2012)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 7197))

Included in the following conference series:

Abstract

We present a secret sharing scheme based on absolute moment block truncation coding (AMBTC) and Hamming code theory. AMBTC is composed of bit planes and two representative gray level pixel values, which are the high and low range means. In this secret sharing scheme, a dealer distributes a secret image to the participants as shadow images. It is important in a secret sharing scheme to keep the shadow images confidential. We therefore propose verifying the authenticity of the reconstructed secret image during the revealing and verifying phase. In order to improve confidentiality, our proposed scheme uses meaningful AMBTC compressed images. Experimental results show that the reconstructed secret sharing images are the same as the original secret sharing images and that the proposed scheme exhibits good performance compared to that of previous schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Yang, C.Y., Lin, C.H., Hu, W.C.: Reversible data hiding by adaptive IWT-coefficient adjustment. Journal of Information Hiding and Multimedia Signal Processing 3(1), 24-34 (2011)

    Google Scholar 

  2. Lin, B., He, J., Huang, J., Shi, Y.Q.: A survey on image steganography and steganalysis. Journal of Information Hiding and Multimedia Signal Processing 2(2), 142–172 (2011)

    Google Scholar 

  3. Yang, C.Y., Hu, W.C.: High-performance reversible data hiding with overflow/underflow avoidance. ETRI Journal 33(4), 580–588 (2011)

    Article  Google Scholar 

  4. Shamir, A.: How to share a secret. Communications of the ACM 22(11), 612–613 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  5. Karnin, E.D., Greene, J.W., Hellman, M.E.: On secret sharing systems. IEEE Transactions on Information Theory 29, 35–41 (1983)

    Article  MathSciNet  MATH  Google Scholar 

  6. Stinson, D.R.: Decomposition constructions for secret-sharing schemes. IEEE Transactions on Information Theory 40(1), 118–124 (1994)

    Article  MathSciNet  MATH  Google Scholar 

  7. Verheul, E.R., van Tilborg, H.C.A.: Constructions and properties of k out of n visual secret sharing schemes. Designs, Codes and Cryptography 11(2), 179–196 (1997)

    Article  MathSciNet  MATH  Google Scholar 

  8. Blundo, C., Santis, A.D.: Lower bounds for robust secret sharing schemes. Information Processing Letters 63(6), 317–321 (1997)

    Article  MathSciNet  MATH  Google Scholar 

  9. Benaloh, J., Leichter, J.: Generalized Secret Sharing and Monotone Functions. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 27–35. Springer, Heidelberg (1990)

    Chapter  Google Scholar 

  10. Lin, C.C., Tsai, W.H.: Secret image sharing with steganography and authentication. Journal of Systems Software 73(3), 405–414 (2004)

    Article  Google Scholar 

  11. Yang, C.N., Yu, K.H., Lukac, R.: User-friendly image sharing using polynomials with different primes. International Journal of Imaging Systems Technology 17(1), 40–47 (2007)

    Article  Google Scholar 

  12. Tsai, C.S., Chang, C.C., Chen, T.S.: Sharing multiple secrets in digital images. Journal of Systems Software 64(2), 163–170 (2002)

    Article  Google Scholar 

  13. Thien, C., Lin, J.C.: Secret image sharing. Computers and Graphics 26(1), 765–770 (2002)

    Article  Google Scholar 

  14. Wu, Y.S., Thien, C.C., Lin, J.C.: Sharing and hiding secret images with size constraint. Pattern Recognition 37(7), 1377–1385 (2004)

    Article  Google Scholar 

  15. Chang, C.C., Lin, C.C., Lin, C.H., Chen, Y.H.: A novel secret image sharing scheme in color images using small shadow images. Information Sciences 178(11), 2433–2447 (2008)

    Article  Google Scholar 

  16. Lema, M., Mitchell, O.: Absolute moment blocks truncation coding and applications to color images. IEEE Transactions on Communications 32, 1148–1157 (1984)

    Article  Google Scholar 

  17. Tu, S.F., Hsu, C.S.: A btc-based watermarking scheme for digital images. International Journal of Information Security 15(2), 216–228 (2004)

    Article  Google Scholar 

  18. Grossman, J.: Coding theory: introduction to linear codes and applications. Insight: River Academic Journal 4(2), 1–17 (2008)

    Google Scholar 

  19. Ichigaya, A., Kurozumi, M., Hara, N., Nishida, Y., Nakasu, E.: A method of estimating coding PSNR using quantized DCT coefficients. IEEE Transactions on Circuits and Systems for Video Technology 16(2), 251–259 (2006)

    Article  Google Scholar 

  20. Prisco, R.D., Santis, A.D.: Cheating Immune (2, n)-Threshold Visual Secret Sharing. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 216–228. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  21. Tsai, S., Chen, T.H., Horng, G.: A cheating prevention scheme for binary visual cryptography with homogeneous secret images. Pattern Recognition 40(8), 2356–2366 (2007)

    Article  MATH  Google Scholar 

  22. Shang, C.C., Lin, C.C., Le, T.H.N., Le, H.B.: Sharing a verifiable secret image using two shadows. Pattern Recognition 42, 3097–3114 (2009)

    Article  MATH  Google Scholar 

  23. Cai, K.Y., Wang, S.S., Shiu, P.F., Lin, C.C.: A verifiable secret sharing scheme based on AMBTC. In: Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011, pp. 129–138. ACM, Seoul (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, C., Shin, D., Shin, D., Yang, CN. (2012). A (2, 2) Secret Sharing Scheme Based on Hamming Code and AMBTC. In: Pan, JS., Chen, SM., Nguyen, N.T. (eds) Intelligent Information and Database Systems. ACIIDS 2012. Lecture Notes in Computer Science(), vol 7197. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28490-8_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-28490-8_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-28489-2

  • Online ISBN: 978-3-642-28490-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics