Abstract
Secret image sharing is a technique to share a secret image among a set of n participants. A trusted third party embeds the secret image into the cover image to generate shadow images such that at least t or more shadow images can reconstruct the secret image. In this paper, we consider an extreme and real-world situation, in which there is no one who is trusted by anyone else. In the proposed scheme, the participants can act as a dealer and communicate with each other in a secret channel. Each participant can generate her/his own shadow image independently, according to the cover image and the secret image. Experimental results are provided to show that the shadow images have satisfactory quality. In addition, our scheme has a large embedding capacity, and the secret image can be reconstructed losslessly.
Similar content being viewed by others
References
Blakley G (1979) Safeguarding cryptographic keys. In: Proceedings of the National Computer Conference. pp 313–317
Chang CC, Lin CC, Le Ngan TH, Le HB (2009) Sharing a verifiable secret image using two shadows. Pattern Recogn 42(11):3097–3114
Eslami Z, Ahmadabadi JZ (2011) Secret image sharing with authentication-chaining and dynamic embedding. J Syst Softw 84(5):803–809
Eslami Z, Razzaghi SH, Ahmadabadi JZ (2010) Secret image sharing based on cellular automata and steganography. Pattern Recogn 43(1):397–404
Guo C, Chang CC, Qin C (2012) A multi-threshold secret image sharing scheme based on MSP. Pattern Recognit Lett 33(12):1594–1600
Guo C, Chang CC, Qin C (2012) A hierarchical threshold secret image sharing. Pattern Recognit Lett 33(1):83–91
Harn L (1995) Efficient sharing (broadcasting) of multiple secret. IEE Proc Comput Digit Tech 142(3):237–240
Harn L, Lin CL (2010) Strong (n, t, n) verifiable secret sharing scheme. Inf Sci 180(16):3059–3064
Hwang RJ, Chang CC (1998) An on-line secret sharing scheme for multi-secrets. Comput Commun 21(13):1170–1176
Ingemarsson I, Simmons GJ (1991) A protocol to set up shared secret schemes without the assistance of a mutually trusted party. In: Damgård IB (ed) Advances in cryptology, proceedings of the eurocrypt’90. Springer, Aarhus, pp 266–282
Lin PY, Chan CS (2010) Invertible secret image sharing with steganography. Pattern Recognit Lett 31(13):1887–1893
Lin PY, Lee JS, Chang CC (2009) Distortion-free secret image sharing mechanism using modulus operator. Pattern Recogn 42(5):886–895
Lin C, Tsai W (2004) Secret image sharing with steganography and authentication. J Syst Softw 73(3):405–414
Lin YY, Wang RZ (2010) Scalable secret image sharing with smaller shadow image. IEEE Signal Proc Lett 17(3):316–319
Noar N, Shamir A (1995) Visual cryptography. In: Santis AD (ed) Advances in cryptology: eurocrypt’94. Springer, Perugia, pp 1–12
Pedersen TP (1991) A threshold cryptosystem without a trusted party. In: Davies DW (ed) Advances in cryptology, proceedings of the eurocrypt’91. Springer, Brighton, pp 522–526
Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613
Thien CC, Lin JC (2002) Secret image sharing. Comput Graph 26(5):765–770
Wang RZ, Su CH (2006) Secret image sharing with smaller shadow images. Pattern Recognit Lett 27(6):551–555
Wang D, Zhang L, Ma N, Li X (2007) Two secret sharing schemes based on Boolean operations. Pattern Recogn 40(10):2776–2785
Wu XT, Ou DH, Liang QM, Sun W (2012) A user-friendly secret image sharing scheme with reversible steganography based on cellular automata. J Syst Softw 85(8):1852–1863
Yang CN (2004) New visual secret sharing schemes using probabilistic method. Pattern Recognit Lett 25(4):481–494
Yang CC, Chang TY, Hwang MS (2004) A (t, n) multi-secret sharing scheme. Appl Math Comput 151(2):483–490
Yang CN, Chen TS, Yu KH, Wang CC (2007) Improvements of image sharing with steganography and authentication. J Syst Softw 80(7):1070–1076
Zhao JJ, Zhang JZ, Zhao R (2007) A practical verifiable multi-secret sharing scheme. Comput Stand Interfaces 29(1):138–141
Acknowledgments
This work was supported by the Fundamental Research Funds for the Central Universities under grants DUT12RC(3)80.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Guo, C., Chang, CC. & Qin, C. A novel (n, t, n) secret image sharing scheme without a trusted third party. Multimed Tools Appl 72, 2195–2209 (2014). https://doi.org/10.1007/s11042-013-1510-0
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-013-1510-0