A Verifiable and Recoverable Secret Image Sharing Mechanism

Verifiability is essential for a secret sharing approach which allows the involved participants to detect cheaters during the secret retrieval process. In this article, we propose a verifiable secret image sharing scheme that can not only resist dishonest participants but can also satisfy the requirements of loss less and camouflage. The new approach conceals the shadows into a pixel pair of the host image by adding or subtracting a pixel value by 1. Consequently, the embedding alteration can be reduced to preserve the fidelity of the shadow image. Recoverability is a practical essential for protecting the valuable host image from being distorted. After the authorized participants retrieve a loss less secret image, they can remove the shadows from the shadow images to recover the unmarked host image. The experimental results exhibit that the proposed scheme can share a large secret capacity according to the threshold t and retain superior quality of around 52 dB.

[1]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[2]  Wen-Hsiang Tsai,et al.  Generic Lossless Visible Watermarking—A New Approach , 2010, IEEE Transactions on Image Processing.

[3]  Chin-Chen Chang,et al.  Reversible Data Hiding Based on Histogram Modification of Pixel Differences , 2009, IEEE Transactions on Circuits and Systems for Video Technology.

[4]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[5]  Chang-Chou Lin,et al.  Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..

[6]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[7]  Chin-Chen Chang,et al.  Sharing secrets in stego images with authentication , 2008, Pattern Recognit..

[8]  Jun Tian,et al.  Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..

[9]  Martin Tompa,et al.  How to share a secret with cheaters , 1988, Journal of Cryptology.

[10]  Ja-Chen Lin,et al.  Secret image sharing , 2002, Comput. Graph..

[11]  Xinpeng Zhang,et al.  Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.

[12]  Ching-Nung Yang,et al.  Improvements of image sharing with steganography and authentication , 2007, J. Syst. Softw..

[13]  Rong Zhao,et al.  A new image secret sharing scheme to identify cheaters , 2009, Comput. Stand. Interfaces.

[14]  Ja-Chen Lin,et al.  Sharing and hiding secret images with size constraint , 2004, Pattern Recognit..