Threshold Secret Image Sharing

A (k,n) threshold secret image sharing scheme, abbreviated as (k,n)-TSISS, splits a secret image into n shadow images in such a way that any k shadow images can be used to reconstruct the secret image exactly. In 2002, for (k,n)-TSISS, Thien and Lin reduced the size of each shadow image to $\frac{1}{k}$ of the original secret image. Their main technique is by adopting all coefficients of a (k '—' 1)-degree polynomial to embed the secret pixels. This benefit of small shadow size has drawn many researcher's attention and their technique has been extensively used in the following studies. In this paper, we first show that this technique is neither information theoretic secure nor computational secure. Furthermore, we point out the security defect of previous (k,n)-TSISSs for sharing textual images, and then fix up this security defect by adding an AES encryption process. At last, we prove that this new (k,n)-TSISS is computational secure.

[1]  Feng Liu,et al.  On the Equivalence of Two Definitions of Visual Cryptography Scheme , 2012, ISPEC.

[2]  Feng Liu,et al.  K out of K Extended Visual Cryptography Scheme by Random Grids , 2014, Signal Process..

[3]  Alfredo De Santis,et al.  Visual Cryptography for General Access Structures , 1996, Inf. Comput..

[4]  Chyuan-Huei Thomas Yang,et al.  Reversible secret image sharing based on Shamir's scheme with discrete haar wavelet transform , 2011, 2011 International Conference on Electrical and Control Engineering.

[5]  Yehuda Lindell,et al.  Introduction to Modern Cryptography , 2004 .

[6]  Ching-Nung Yang,et al.  Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability , 2010, Image Vis. Comput..

[7]  Ran-Zan Wang,et al.  Scalable user-friendly image sharing , 2010, J. Vis. Commun. Image Represent..

[8]  Chaur-Heh Hsieh,et al.  Progressive sharing for a secret image , 2010, J. Syst. Softw..

[9]  Jen-Bang Feng,et al.  A new multi-secret images sharing scheme using Largrange's interpolation , 2005, J. Syst. Softw..

[10]  Ja-Chen Lin,et al.  Secret image sharing , 2002, Comput. Graph..

[11]  Ching-Nung Yang,et al.  A comment on "Sharing secrets in stegoimages with authentication" , 2009, Pattern Recognit..

[12]  Oded Goldreich Randomized Methods in Computation-Lecture Notes , 2001 .

[13]  Feng Liu,et al.  Multi-pixel Encryption Visual Cryptography , 2011, Inscrypt.

[14]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[15]  Ja-Chen Lin,et al.  Sharing and hiding secret images with size constraint , 2004, Pattern Recognit..

[16]  Ja-Chen Lin,et al.  An image-sharing method with user-friendly shadow images , 2003, IEEE Trans. Circuits Syst. Video Technol..

[17]  Feng Liu,et al.  Improving the visual quality of size invariant visual cryptography scheme , 2012, J. Vis. Commun. Image Represent..

[18]  Mihir Bellare,et al.  Lecture Notes on Cryptography , 2001 .

[19]  Ching-Nung Yang,et al.  Steganography and authentication in image sharing without parity bits , 2012 .

[20]  Peng Li,et al.  Improvements of a two-in-one image secret sharing scheme based on gray mixing model , 2012, J. Vis. Commun. Image Represent..

[21]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[22]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[23]  Ran-Zan Wang,et al.  Scalable secret image sharing , 2007, Signal Process. Image Commun..

[24]  Li Bai A Reliable (k, n) Image Secret Sharing Scheme , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.

[25]  Vasif V. Nabiyev,et al.  Medical image security and EPR hiding using Shamir's secret sharing scheme , 2011, J. Syst. Softw..

[26]  Chin-Chen Chang,et al.  Sharing secrets in stego images with authentication , 2008, Pattern Recognit..

[27]  Rong Zhao,et al.  A new image secret sharing scheme to identify cheaters , 2009, Comput. Stand. Interfaces.

[28]  Jonathan Katz,et al.  Introduction to Modern Cryptography: Principles and Protocols , 2007 .

[29]  Thomas M. Cover,et al.  Elements of information theory (2. ed.) , 2006 .

[30]  Feng Liu,et al.  Threshold visual secret sharing by random grids with improved contrast , 2013, J. Syst. Softw..

[31]  Ran-Zan Wang,et al.  Secret image sharing with smaller shadow images , 2006, Pattern Recognit. Lett..

[32]  Yehuda Lindell,et al.  Introduction to Modern Cryptography (Chapman & Hall/Crc Cryptography and Network Security Series) , 2007 .

[33]  A. Ben Hamza,et al.  Robust Approaches to 3D Object Secret Sharing , 2010, ICIAR.

[34]  Chi-Shiang Chan,et al.  Secret Image Sharing with Steganography and Authentication Using Dynamic Programming Strategy , 2010, 2010 First International Conference on Pervasive Computing, Signal Processing and Applications.

[35]  Ching-Nung Yang,et al.  Improvements of image sharing with steganography and authentication , 2007, J. Syst. Softw..