skip to main content
research-article

Double Verification Secret Sharing Mechanism Based on Adaptive Pixel Pair Matching

Published: 05 February 2015 Publication History

Abstract

Verifiability is essential for the secret sharing approach, which allows the involved participants to detect cheaters during the secret retrieval process. In this article, we propose a double verification secret sharing (DVSS) mechanism that can not only prevent fraudulent participants but also satisfy the requirements of secret payload, camouflage, image fidelity and lossless revealed secret. DVSS offers double verification process to enhance the cheater detectability; experimental results reveal that the designed scheme can share larger secret capacity and retain superior image quality than the related secret sharing methods.

References

[1]
George R. Blakley. 1979. Safeguarding cryptographic keys. In Proceedings of the AFIPS National Computer Conference 48, 313--317.
[2]
Chi-Kwong Chan and Lee-Ming Cheng. 2004. Hiding data in images by simple LSB substitution. Pattern Recognit. 37, 3, 469--474.
[3]
Chin-Chen Chang, Yi-Pei Hsieh, and Chia-Hsuan Lin. 2008. Sharing secrets in stego images with authentication. Pattern Recognit. 41, 10, 3130--3137.
[4]
Ruey-Ming Chao, Hsien-Chu Wu, Chih-Chiang Lee, and Yen-Ping Chu. 2009. A novel image data hiding scheme with diamond encoding. EURASIP J. Info. Security, Article ID 658047.
[5]
Wei-Kuei Chen. 2013. Image sharing method for gray-level images. J. Syst. Softw. 86, 2, 581--585.
[6]
CVG-UGR Image Database. 2002. Computer vision group, University of Granada. http://decsai.ugr.es/cvg/dbimagenes/.
[7]
Ziba Eslami and J. Zarepour Ahmadabadi. 2011. Secret image sharing with authentication-chaining and dynamic embedding. J. Syst. Softw. 84, 5, 803--809.
[8]
Wien Hong and Tung-Shou Chen. 2012. A novel data embedding method using adaptive pixel pair matching. IEEE Trans. Info. Forensics Secur. 7, 1, 176--184.
[9]
Chih-Ming Hu and Wen-Guey Tzeng. 2007. Cheating prevention in visual cryptography. IEEE Trans. Image Process. 16, 1, 36--45.
[10]
Chang-Chou Lin and Wen-Hsiang Tsai. 2004. Secret image sharing with steganography and authentication. J. Syst. Softw. 73, 3, 405--414.
[11]
Pei-Yu Lin, Yi-Hui Chen, Chin-Chen Chang, and Jung-San Lee. 2013. Contrast-adaptive removable visible watermarking (CARVW) Mechanism. Image Vision Comput. 31, 4, 311--321.
[12]
Pei-Yu Lin, Jung-San Lee, and Chin-Chen Chang. 2009. Distortion-free secret image sharing mechanism using modulus operator. Pattern Recognit. 42, 5, 886--895.
[13]
Playboy Magazine. 1972. Lena image. Playboy.
[14]
Moni Naor and Adi Shamir. 1995. Visual cryptography. In Advances in Cryptology: Eurocrypt'94, Springer.
[15]
Adi Shamir. 1979. How to share a secret. Commun. ACM 22, 11, 612--613.
[16]
Chih-Ching Thien and Ja-Chen Lin. 2002. Secret image sharing. Computer Graph. 26, 1, 765--770.
[17]
Martin Tompa and Heather Woll. 1988. How to share a secret with cheaters. J. Cryptology 1, 2, 133--138.
[18]
Mustafa Ulutas, Guzin Ulutas, and Vasif V. Nabiyev. 2011. Medical image security and EPR hiding using Shamir's secret sharing scheme. J. Syst. Softw. 84, 3, 341--353.
[19]
Mustafa Ulutas, Guzin Ulutas, and Vasif V. Nabiyev. 2013. Invertible secret image sharing for gray level and dithered cover images. J. Syst. Softw. 86, 2, 485--500.
[20]
Xiaotian Wu, Tong Liu, and Wei Sun. 2013. Improving the visual quality of random grid-based visual secret sharing via error diffusion. J. Visual Commun. Image Represent. 24, 5, 552--566.
[21]
Yu-Shan Wu, Chih-Ching Thien, and Ja-Chen Lin. 2004. Sharing and hiding secret images with size constraint. Pattern Recognit. 37, 7, 1377--1385.
[22]
Ching-Nung Yang, Tse-Shih Chen, Kun-Hsuan Yu, and Chung-Chun Wang. 2007. Improvements of image sharing with steganography and authentication. J. Syst. Softw. 80, 7, 1070--1076.
[23]
Xinpeng Zhang and Shuozhong Wang. 2006. Efficient steganographic embedding by exploiting modification direction. IEEE Commun. Lett. 10, 11, 781--783.

Cited By

View all
  • (2022)RDH-DES: Reversible Data Hiding over Distributed Encrypted-Image Servers Based on Secret SharingACM Transactions on Multimedia Computing, Communications, and Applications10.1145/351279719:1(1-19)Online publication date: 9-Mar-2022
  • (2019)A Dual-Camera Surveillance Video Summarization Generating Strategy for Multi-Target CapturingProceedings of the 3rd International Conference on Video and Image Processing10.1145/3376067.3376071(121-125)Online publication date: 20-Dec-2019
  • (2019)RTMCHMultimedia Tools and Applications10.1007/s11042-018-6480-978:6(7803-7818)Online publication date: 17-May-2019
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Multimedia Computing, Communications, and Applications
ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 11, Issue 3
January 2015
173 pages
ISSN:1551-6857
EISSN:1551-6865
DOI:10.1145/2733235
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 05 February 2015
Accepted: 01 October 2014
Revised: 01 August 2014
Received: 01 March 2014
Published in TOMM Volume 11, Issue 3

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Camouflage
  2. adaptive pixel pair matching
  3. secret sharing

Qualifiers

  • Research-article
  • Research
  • Refereed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2022)RDH-DES: Reversible Data Hiding over Distributed Encrypted-Image Servers Based on Secret SharingACM Transactions on Multimedia Computing, Communications, and Applications10.1145/351279719:1(1-19)Online publication date: 9-Mar-2022
  • (2019)A Dual-Camera Surveillance Video Summarization Generating Strategy for Multi-Target CapturingProceedings of the 3rd International Conference on Video and Image Processing10.1145/3376067.3376071(121-125)Online publication date: 20-Dec-2019
  • (2019)RTMCHMultimedia Tools and Applications10.1007/s11042-018-6480-978:6(7803-7818)Online publication date: 17-May-2019
  • (2018)A location and mobility independent scheme to quantify the neighbourhood stability of a node in mobile sensor networksInternational Journal of Mobile Network Design and Innovation10.5555/3272206.32722128:2(111-125)Online publication date: 13-Dec-2018
  • (2018)A location and mobility independent scheme to quantify the neighbourhood stability of a node in mobile sensor networksInternational Journal of Mobile Network Design and Innovation10.5555/3272193.32721998:2(111-125)Online publication date: 13-Dec-2018
  • (2018)A location and mobility independent scheme to quantify the neighbourhood stability of a node in mobile sensor networksInternational Journal of Mobile Network Design and Innovation10.5555/3272186.32721928:2(111-125)Online publication date: 13-Dec-2018

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media