Abstract
We present a secret sharing scheme based on absolute moment block truncation coding (AMBTC) and Hamming code theory. AMBTC is composed of bit planes and two representative gray level pixel values, which are the high and low range means. In this secret sharing scheme, a dealer distributes a secret image to the participants as shadow images. It is important in a secret sharing scheme to keep the shadow images confidential. We therefore propose verifying the authenticity of the reconstructed secret image during the revealing and verifying phase. In order to improve confidentiality, our proposed scheme uses meaningful AMBTC compressed images. Experimental results show that the reconstructed secret sharing images are the same as the original secret sharing images and that the proposed scheme exhibits good performance compared to that of previous schemes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Yang, C.Y., Lin, C.H., Hu, W.C.: Reversible data hiding by adaptive IWT-coefficient adjustment. Journal of Information Hiding and Multimedia Signal Processing 3(1), 24-34 (2011)
Lin, B., He, J., Huang, J., Shi, Y.Q.: A survey on image steganography and steganalysis. Journal of Information Hiding and Multimedia Signal Processing 2(2), 142–172 (2011)
Yang, C.Y., Hu, W.C.: High-performance reversible data hiding with overflow/underflow avoidance. ETRI Journal 33(4), 580–588 (2011)
Shamir, A.: How to share a secret. Communications of the ACM 22(11), 612–613 (1979)
Karnin, E.D., Greene, J.W., Hellman, M.E.: On secret sharing systems. IEEE Transactions on Information Theory 29, 35–41 (1983)
Stinson, D.R.: Decomposition constructions for secret-sharing schemes. IEEE Transactions on Information Theory 40(1), 118–124 (1994)
Verheul, E.R., van Tilborg, H.C.A.: Constructions and properties of k out of n visual secret sharing schemes. Designs, Codes and Cryptography 11(2), 179–196 (1997)
Blundo, C., Santis, A.D.: Lower bounds for robust secret sharing schemes. Information Processing Letters 63(6), 317–321 (1997)
Benaloh, J., Leichter, J.: Generalized Secret Sharing and Monotone Functions. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 27–35. Springer, Heidelberg (1990)
Lin, C.C., Tsai, W.H.: Secret image sharing with steganography and authentication. Journal of Systems Software 73(3), 405–414 (2004)
Yang, C.N., Yu, K.H., Lukac, R.: User-friendly image sharing using polynomials with different primes. International Journal of Imaging Systems Technology 17(1), 40–47 (2007)
Tsai, C.S., Chang, C.C., Chen, T.S.: Sharing multiple secrets in digital images. Journal of Systems Software 64(2), 163–170 (2002)
Thien, C., Lin, J.C.: Secret image sharing. Computers and Graphics 26(1), 765–770 (2002)
Wu, Y.S., Thien, C.C., Lin, J.C.: Sharing and hiding secret images with size constraint. Pattern Recognition 37(7), 1377–1385 (2004)
Chang, C.C., Lin, C.C., Lin, C.H., Chen, Y.H.: A novel secret image sharing scheme in color images using small shadow images. Information Sciences 178(11), 2433–2447 (2008)
Lema, M., Mitchell, O.: Absolute moment blocks truncation coding and applications to color images. IEEE Transactions on Communications 32, 1148–1157 (1984)
Tu, S.F., Hsu, C.S.: A btc-based watermarking scheme for digital images. International Journal of Information Security 15(2), 216–228 (2004)
Grossman, J.: Coding theory: introduction to linear codes and applications. Insight: River Academic Journal 4(2), 1–17 (2008)
Ichigaya, A., Kurozumi, M., Hara, N., Nishida, Y., Nakasu, E.: A method of estimating coding PSNR using quantized DCT coefficients. IEEE Transactions on Circuits and Systems for Video Technology 16(2), 251–259 (2006)
Prisco, R.D., Santis, A.D.: Cheating Immune (2, n)-Threshold Visual Secret Sharing. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 216–228. Springer, Heidelberg (2006)
Tsai, S., Chen, T.H., Horng, G.: A cheating prevention scheme for binary visual cryptography with homogeneous secret images. Pattern Recognition 40(8), 2356–2366 (2007)
Shang, C.C., Lin, C.C., Le, T.H.N., Le, H.B.: Sharing a verifiable secret image using two shadows. Pattern Recognition 42, 3097–3114 (2009)
Cai, K.Y., Wang, S.S., Shiu, P.F., Lin, C.C.: A verifiable secret sharing scheme based on AMBTC. In: Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011, pp. 129–138. ACM, Seoul (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, C., Shin, D., Shin, D., Yang, CN. (2012). A (2, 2) Secret Sharing Scheme Based on Hamming Code and AMBTC. In: Pan, JS., Chen, SM., Nguyen, N.T. (eds) Intelligent Information and Database Systems. ACIIDS 2012. Lecture Notes in Computer Science(), vol 7197. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28490-8_14
Download citation
DOI: https://doi.org/10.1007/978-3-642-28490-8_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-28489-2
Online ISBN: 978-3-642-28490-8
eBook Packages: Computer ScienceComputer Science (R0)