Double Verification Secret Sharing Mechanism Based on Adaptive Pixel Pair Matching

Verifiability is essential for the secret sharing approach, which allows the involved participants to detect cheaters during the secret retrieval process. In this article, we propose a double verification secret sharing (DVSS) mechanism that can not only prevent fraudulent participants but also satisfy the requirements of secret payload, camouflage, image fidelity and lossless revealed secret. DVSS offers double verification process to enhance the cheater detectability; experimental results reveal that the designed scheme can share larger secret capacity and retain superior image quality than the related secret sharing methods.

[1]  Martin Tompa,et al.  How to share a secret with cheaters , 1988, Journal of Cryptology.

[2]  Ja-Chen Lin,et al.  Secret image sharing , 2002, Comput. Graph..

[3]  Chin-Chen Chang,et al.  Contrast-Adaptive Removable Visible Watermarking (CARVW) mechanism , 2013, Image Vis. Comput..

[4]  Xinpeng Zhang,et al.  Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.

[5]  G. R. Blakley,et al.  Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[6]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[7]  Chang-Chou Lin,et al.  Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..

[8]  Ching-Nung Yang,et al.  Improvements of image sharing with steganography and authentication , 2007, J. Syst. Softw..

[9]  Tung-Shou Chen,et al.  A Novel Data Embedding Method Using Adaptive Pixel Pair Matching , 2012, IEEE Transactions on Information Forensics and Security.

[10]  Yen-Ping Chu,et al.  A Novel Image Data Hiding Scheme with Diamond Encoding , 2009, EURASIP J. Inf. Secur..

[11]  Vasif V. Nabiyev,et al.  Medical image security and EPR hiding using Shamir's secret sharing scheme , 2011, J. Syst. Softw..

[12]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[13]  Ja-Chen Lin,et al.  Sharing and hiding secret images with size constraint , 2004, Pattern Recognit..

[14]  Chin-Chen Chang,et al.  Distortion-free secret image sharing mechanism using modulus operator , 2009, Pattern Recognit..

[15]  Tong Liu,et al.  Improving the visual quality of random grid-based visual secret sharing via error diffusion , 2013, J. Vis. Commun. Image Represent..

[16]  Vasif V. Nabiyev,et al.  Invertible secret image sharing for gray level and dithered cover images , 2013, J. Syst. Softw..

[17]  Wei-Kuei Chen,et al.  Image sharing method for gray-level images , 2013, J. Syst. Softw..

[18]  Ziba Eslami,et al.  Secret image sharing with authentication-chaining and dynamic embedding , 2011, J. Syst. Softw..

[19]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[20]  Chin-Chen Chang,et al.  Sharing secrets in stego images with authentication , 2008, Pattern Recognit..

[21]  Wen-Guey Tzeng,et al.  Cheating Prevention in Visual Cryptography , 2007, IEEE Transactions on Image Processing.

[22]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.