Secret image sharing is a technique used to secure digital images against disclosure and tampering. In this paper, we analyze the security of the secret image sharing scheme proposed by Thien and Lin [1] and expose its weakness. Their method uses a permutation step which requires a key. The security of their method is dependent more on this key rather than on the unconditional security characteristics of the secret sharing scheme [2]. We propose an improved scheme for the secret image sharing by removing the permutation step. The core idea of our scheme is to divide the secret image into k sections and use the pixel values from these sections as the coefficients of the polynomial used for creating shares in Shamir's secret sharing scheme. The security analysis and experimental results are presented to demonstrate the utility of our method.
[1]
K. G. Parvatov.
PERFECT SECRET SHARING SCHEMES
,
2008
.
[2]
Li Bai.
A Reliable (k, n) Image Secret Sharing Scheme
,
2006,
2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.
[3]
Douglas R. Stinson,et al.
Cryptography: Theory and Practice
,
1995
.
[4]
Christian Cachin,et al.
Entropy measures and unconditional security in cryptography
,
1997
.
[5]
Adi Shamir,et al.
How to share a secret
,
1979,
CACM.
[6]
Ja-Chen Lin,et al.
Secret image sharing
,
2002,
Comput. Graph..