An adaptive secret image sharing with a new bitwise steganographic property

Recently, numerous studies have been conducted in the area of secret image sharing and steganography. The main objective of these schemes is to produce high-quality tampering-resistant stego images. A number of these methods are based on least significant bit embedding and hence, the presence of hidden data can be detected by well-designed steganalysis algorithms.This paper proposes a new sharing scheme for critical images so that stego images are obtained with better visual quality, and at the same time, the authentication ability can be adjusted to any desired level (adaptive). In order to achieve these objectives, the construction of cellular automata is modified so that visual quality is improved, although authentication bits are hidden in cover images. Furthermore, authentication bits are computed in such a way that any tampering with one block affects more than one block. For steganographic purposes, least significant bit replacement is substituted with a new blockwise XOR operation, so that the scheme can withstand steganalysis attacks. The other interesting property of the proposed method is that the size of blocks is determined dynamically, therefore our approach can be adapted with secret/cover images of different sizes.

[1]  Chin-Chen Chang,et al.  Secret Image Sharing Using Quadratic Residues , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[2]  Andrew D. Ker A Capacity Result for Batch Steganography , 2007, IEEE Signal Processing Letters.

[3]  Der-Chyuan Lou,et al.  LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis , 2012, Inf. Sci..

[4]  Sorin Iftene,et al.  Secret Sharing Schemes with Applications in Security Protocols , 2006, Sci. Ann. Cuza Univ..

[5]  Ziba Eslami,et al.  Secret image sharing based on cellular automata and steganography , 2010, Pattern Recognit..

[6]  Wade Trappe,et al.  Introduction to Cryptography with Coding Theory , 2002 .

[7]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[8]  Maurice Mignotte,et al.  How to Share a Secret? , 1982, EUROCRYPT.

[9]  Hugo Krawczyk,et al.  Proactive Secret Sharing Or: How to Cope With Perpetual Leakage , 1995, CRYPTO.

[10]  Chien-Chang Chen,et al.  A secure Boolean-based multi-secret image sharing scheme , 2014, J. Syst. Softw..

[11]  John Bloom,et al.  A modular approach to key safeguarding , 1983, IEEE Trans. Inf. Theory.

[12]  Patrick P. K. Chan,et al.  Steganalysis classifier training via minimizing sensitivity for different imaging sources , 2014, Inf. Sci..

[13]  Ziba Eslami,et al.  An authenticated image encryption scheme based on chaotic maps and memory cellular automata , 2013 .

[14]  Anand Singh Jalal,et al.  Secret image sharing using grayscale payload decomposition and irreversible image steganography , 2013, J. Inf. Secur. Appl..

[15]  Ja-Chen Lin,et al.  An image-sharing method with user-friendly shadow images , 2003, IEEE Trans. Circuits Syst. Video Technol..

[16]  Chin-Chen Chang,et al.  Sharing secrets in stego images with authentication , 2008, Pattern Recognit..

[17]  Shao Jinyou,et al.  モアレ干渉縞パターンを用いたインプリントリソグラフィのアライメントの測定法 | 文献情報 | J-GLOBAL 科学技術総合リンクセンター , 2008 .

[18]  Ching-Nung Yang,et al.  Reducing shadow size in smooth scalable secret image sharing , 2014, Secur. Commun. Networks.

[19]  Ziba Eslami,et al.  Secret image sharing with authentication-chaining and dynamic embedding , 2011, J. Syst. Softw..

[20]  Xiaotian Wu,et al.  Secret image sharing scheme with authentication and remedy abilities based on cellular automata and discrete wavelet transform , 2013, J. Syst. Softw..

[21]  N. Margolus,et al.  Invertible cellular automata: a review , 1991 .

[22]  Ja-Chen Lin,et al.  Secret image sharing , 2002, Comput. Graph..

[23]  Alfred V. Aho,et al.  The Design and Analysis of Computer Algorithms , 1974 .

[24]  Shyong Jian Shyu,et al.  Threshold Secret Image Sharing by Chinese Remainder Theorem , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.

[25]  Chih-Hung Lin,et al.  Distortionless visual multi-secret sharing based on random grid , 2014, Inf. Sci..

[26]  Ramón Alonso-Sanz,et al.  Reversible cellular automata with memory: two-dimensional patterns from a single site seed , 2003 .

[27]  Ángel Martín del Rey,et al.  A secret sharing scheme based on cellular automata , 2005, Appl. Math. Comput..

[28]  Chien-Chang Chen,et al.  A Geometry-Based Secret Image Sharing Approach , 2008, J. Inf. Sci. Eng..

[29]  Reza Safabakhsh,et al.  A new steganography method which preserves histogram: Generalization of LSB++ , 2014, Inf. Sci..

[30]  Kent D. Boklan,et al.  Introduction to cryptography with coding theory, second edition , 2007 .

[31]  Amos Beimel,et al.  Universally ideal secret-sharing schemes , 1994, IEEE Trans. Inf. Theory.

[32]  Sorin Iftene,et al.  General Secret Sharing Based on the Chinese Remainder Theorem with Applications in E-Voting , 2007, ICS@SYNASC.

[33]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[34]  Hai-Dong Yuan,et al.  Secret sharing with multi-cover adaptive steganography , 2014, Inf. Sci..

[35]  Steven X. Ding,et al.  A Review on Basic Data-Driven Approaches for Industrial Process Monitoring , 2014, IEEE Transactions on Industrial Electronics.

[36]  Gang Xu,et al.  Quantum state secure transmission in network communications , 2014, Inf. Sci..

[37]  Massoud Hadian Dehkordi,et al.  Two verifiable multi secret sharing schemes based on nonhomogeneous linear recursion and LFSR public-key cryptosystem , 2015, Inf. Sci..

[38]  Ching-Nung Yang,et al.  Improvements of image sharing with steganography and authentication , 2007, J. Syst. Softw..

[39]  Vasif V. Nabiyev,et al.  Secret image sharing scheme with adaptive authentication strength , 2013, Pattern Recognit. Lett..

[40]  M.R. Aref,et al.  A novel secret sharing scheme from audio perspective , 2008, 2008 International Symposium on Telecommunications.

[41]  Xiaodong Gu,et al.  Histogram similarity measure using variable bin size distance , 2010, Comput. Vis. Image Underst..

[42]  Ferucio Laurentiu Tiplea,et al.  Distributive weighted threshold secret sharing schemes , 2016, Inf. Sci..

[43]  Chang-Chou Lin,et al.  Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..

[44]  Ziba Eslami,et al.  A verifiable multi-secret sharing scheme based on cellular automata , 2010, Inf. Sci..

[45]  Huijun Gao,et al.  Data-Based Techniques Focused on Modern Industry: An Overview , 2015, IEEE Transactions on Industrial Electronics.

[46]  Tomás Pevný,et al.  Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..

[47]  Hao-Kuan Tso Sharing secret images using Blakley's concept , 2008 .

[48]  K. Srinathan,et al.  A novel video encryption technique based on secret sharing , 2008, 2008 15th IEEE International Conference on Image Processing.

[49]  Jun Shao,et al.  Efficient verifiable multi-secret sharing scheme based on hash function , 2014, Inf. Sci..

[50]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[51]  V. Buzek,et al.  Quantum secret sharing , 1998, quant-ph/9806063.

[52]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.