Skip to main content
Log in

A novel (n, t, n) secret image sharing scheme without a trusted third party

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Secret image sharing is a technique to share a secret image among a set of n participants. A trusted third party embeds the secret image into the cover image to generate shadow images such that at least t or more shadow images can reconstruct the secret image. In this paper, we consider an extreme and real-world situation, in which there is no one who is trusted by anyone else. In the proposed scheme, the participants can act as a dealer and communicate with each other in a secret channel. Each participant can generate her/his own shadow image independently, according to the cover image and the secret image. Experimental results are provided to show that the shadow images have satisfactory quality. In addition, our scheme has a large embedding capacity, and the secret image can be reconstructed losslessly.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Blakley G (1979) Safeguarding cryptographic keys. In: Proceedings of the National Computer Conference. pp 313–317

  2. Chang CC, Lin CC, Le Ngan TH, Le HB (2009) Sharing a verifiable secret image using two shadows. Pattern Recogn 42(11):3097–3114

    Article  MATH  Google Scholar 

  3. Eslami Z, Ahmadabadi JZ (2011) Secret image sharing with authentication-chaining and dynamic embedding. J Syst Softw 84(5):803–809

    Article  Google Scholar 

  4. Eslami Z, Razzaghi SH, Ahmadabadi JZ (2010) Secret image sharing based on cellular automata and steganography. Pattern Recogn 43(1):397–404

    Article  MATH  Google Scholar 

  5. Guo C, Chang CC, Qin C (2012) A multi-threshold secret image sharing scheme based on MSP. Pattern Recognit Lett 33(12):1594–1600

    Article  Google Scholar 

  6. Guo C, Chang CC, Qin C (2012) A hierarchical threshold secret image sharing. Pattern Recognit Lett 33(1):83–91

    Article  Google Scholar 

  7. Harn L (1995) Efficient sharing (broadcasting) of multiple secret. IEE Proc Comput Digit Tech 142(3):237–240

    Article  Google Scholar 

  8. Harn L, Lin CL (2010) Strong (n, t, n) verifiable secret sharing scheme. Inf Sci 180(16):3059–3064

    Article  MATH  MathSciNet  Google Scholar 

  9. Hwang RJ, Chang CC (1998) An on-line secret sharing scheme for multi-secrets. Comput Commun 21(13):1170–1176

    Article  Google Scholar 

  10. Ingemarsson I, Simmons GJ (1991) A protocol to set up shared secret schemes without the assistance of a mutually trusted party. In: Damgård IB (ed) Advances in cryptology, proceedings of the eurocrypt’90. Springer, Aarhus, pp 266–282

    Google Scholar 

  11. Lin PY, Chan CS (2010) Invertible secret image sharing with steganography. Pattern Recognit Lett 31(13):1887–1893

    Article  MathSciNet  Google Scholar 

  12. Lin PY, Lee JS, Chang CC (2009) Distortion-free secret image sharing mechanism using modulus operator. Pattern Recogn 42(5):886–895

    Article  MATH  Google Scholar 

  13. Lin C, Tsai W (2004) Secret image sharing with steganography and authentication. J Syst Softw 73(3):405–414

    Article  MathSciNet  Google Scholar 

  14. Lin YY, Wang RZ (2010) Scalable secret image sharing with smaller shadow image. IEEE Signal Proc Lett 17(3):316–319

    Article  Google Scholar 

  15. Noar N, Shamir A (1995) Visual cryptography. In: Santis AD (ed) Advances in cryptology: eurocrypt’94. Springer, Perugia, pp 1–12

    Google Scholar 

  16. Pedersen TP (1991) A threshold cryptosystem without a trusted party. In: Davies DW (ed) Advances in cryptology, proceedings of the eurocrypt’91. Springer, Brighton, pp 522–526

    Google Scholar 

  17. Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613

    Article  MATH  MathSciNet  Google Scholar 

  18. Thien CC, Lin JC (2002) Secret image sharing. Comput Graph 26(5):765–770

    Article  Google Scholar 

  19. Wang RZ, Su CH (2006) Secret image sharing with smaller shadow images. Pattern Recognit Lett 27(6):551–555

    Article  Google Scholar 

  20. Wang D, Zhang L, Ma N, Li X (2007) Two secret sharing schemes based on Boolean operations. Pattern Recogn 40(10):2776–2785

    Article  MATH  Google Scholar 

  21. Wu XT, Ou DH, Liang QM, Sun W (2012) A user-friendly secret image sharing scheme with reversible steganography based on cellular automata. J Syst Softw 85(8):1852–1863

    Article  Google Scholar 

  22. Yang CN (2004) New visual secret sharing schemes using probabilistic method. Pattern Recognit Lett 25(4):481–494

    Article  Google Scholar 

  23. Yang CC, Chang TY, Hwang MS (2004) A (t, n) multi-secret sharing scheme. Appl Math Comput 151(2):483–490

    Article  MATH  MathSciNet  Google Scholar 

  24. Yang CN, Chen TS, Yu KH, Wang CC (2007) Improvements of image sharing with steganography and authentication. J Syst Softw 80(7):1070–1076

    Article  Google Scholar 

  25. Zhao JJ, Zhang JZ, Zhao R (2007) A practical verifiable multi-secret sharing scheme. Comput Stand Interfaces 29(1):138–141

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported by the Fundamental Research Funds for the Central Universities under grants DUT12RC(3)80.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chin-Chen Chang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Guo, C., Chang, CC. & Qin, C. A novel (n, t, n) secret image sharing scheme without a trusted third party. Multimed Tools Appl 72, 2195–2209 (2014). https://doi.org/10.1007/s11042-013-1510-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-013-1510-0

Keywords

Navigation