Multimedia Tools and Applications

, Volume 72, Issue 3, pp 2195–2209 | Cite as

A novel (n, t, n) secret image sharing scheme without a trusted third party

  • Cheng Guo
  • Chin-Chen Chang
  • Chuan Qin


Secret image sharing is a technique to share a secret image among a set of n participants. A trusted third party embeds the secret image into the cover image to generate shadow images such that at least t or more shadow images can reconstruct the secret image. In this paper, we consider an extreme and real-world situation, in which there is no one who is trusted by anyone else. In the proposed scheme, the participants can act as a dealer and communicate with each other in a secret channel. Each participant can generate her/his own shadow image independently, according to the cover image and the secret image. Experimental results are provided to show that the shadow images have satisfactory quality. In addition, our scheme has a large embedding capacity, and the secret image can be reconstructed losslessly.


(n, t, n) secret sharing Modulo operator Additive homomorphism Secret image sharing Trusted third party 



This work was supported by the Fundamental Research Funds for the Central Universities under grants DUT12RC(3)80.


  1. 1.
    Blakley G (1979) Safeguarding cryptographic keys. In: Proceedings of the National Computer Conference. pp 313–317Google Scholar
  2. 2.
    Chang CC, Lin CC, Le Ngan TH, Le HB (2009) Sharing a verifiable secret image using two shadows. Pattern Recogn 42(11):3097–3114CrossRefMATHGoogle Scholar
  3. 3.
    Eslami Z, Ahmadabadi JZ (2011) Secret image sharing with authentication-chaining and dynamic embedding. J Syst Softw 84(5):803–809CrossRefGoogle Scholar
  4. 4.
    Eslami Z, Razzaghi SH, Ahmadabadi JZ (2010) Secret image sharing based on cellular automata and steganography. Pattern Recogn 43(1):397–404CrossRefMATHGoogle Scholar
  5. 5.
    Guo C, Chang CC, Qin C (2012) A multi-threshold secret image sharing scheme based on MSP. Pattern Recognit Lett 33(12):1594–1600CrossRefGoogle Scholar
  6. 6.
    Guo C, Chang CC, Qin C (2012) A hierarchical threshold secret image sharing. Pattern Recognit Lett 33(1):83–91CrossRefGoogle Scholar
  7. 7.
    Harn L (1995) Efficient sharing (broadcasting) of multiple secret. IEE Proc Comput Digit Tech 142(3):237–240CrossRefGoogle Scholar
  8. 8.
    Harn L, Lin CL (2010) Strong (n, t, n) verifiable secret sharing scheme. Inf Sci 180(16):3059–3064CrossRefMATHMathSciNetGoogle Scholar
  9. 9.
    Hwang RJ, Chang CC (1998) An on-line secret sharing scheme for multi-secrets. Comput Commun 21(13):1170–1176CrossRefGoogle Scholar
  10. 10.
    Ingemarsson I, Simmons GJ (1991) A protocol to set up shared secret schemes without the assistance of a mutually trusted party. In: Damgård IB (ed) Advances in cryptology, proceedings of the eurocrypt’90. Springer, Aarhus, pp 266–282Google Scholar
  11. 11.
    Lin PY, Chan CS (2010) Invertible secret image sharing with steganography. Pattern Recognit Lett 31(13):1887–1893CrossRefMathSciNetGoogle Scholar
  12. 12.
    Lin PY, Lee JS, Chang CC (2009) Distortion-free secret image sharing mechanism using modulus operator. Pattern Recogn 42(5):886–895CrossRefMATHGoogle Scholar
  13. 13.
    Lin C, Tsai W (2004) Secret image sharing with steganography and authentication. J Syst Softw 73(3):405–414CrossRefMathSciNetGoogle Scholar
  14. 14.
    Lin YY, Wang RZ (2010) Scalable secret image sharing with smaller shadow image. IEEE Signal Proc Lett 17(3):316–319CrossRefGoogle Scholar
  15. 15.
    Noar N, Shamir A (1995) Visual cryptography. In: Santis AD (ed) Advances in cryptology: eurocrypt’94. Springer, Perugia, pp 1–12Google Scholar
  16. 16.
    Pedersen TP (1991) A threshold cryptosystem without a trusted party. In: Davies DW (ed) Advances in cryptology, proceedings of the eurocrypt’91. Springer, Brighton, pp 522–526Google Scholar
  17. 17.
    Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613CrossRefMATHMathSciNetGoogle Scholar
  18. 18.
    Thien CC, Lin JC (2002) Secret image sharing. Comput Graph 26(5):765–770CrossRefGoogle Scholar
  19. 19.
    Wang RZ, Su CH (2006) Secret image sharing with smaller shadow images. Pattern Recognit Lett 27(6):551–555CrossRefGoogle Scholar
  20. 20.
    Wang D, Zhang L, Ma N, Li X (2007) Two secret sharing schemes based on Boolean operations. Pattern Recogn 40(10):2776–2785CrossRefMATHGoogle Scholar
  21. 21.
    Wu XT, Ou DH, Liang QM, Sun W (2012) A user-friendly secret image sharing scheme with reversible steganography based on cellular automata. J Syst Softw 85(8):1852–1863CrossRefGoogle Scholar
  22. 22.
    Yang CN (2004) New visual secret sharing schemes using probabilistic method. Pattern Recognit Lett 25(4):481–494CrossRefGoogle Scholar
  23. 23.
    Yang CC, Chang TY, Hwang MS (2004) A (t, n) multi-secret sharing scheme. Appl Math Comput 151(2):483–490CrossRefMATHMathSciNetGoogle Scholar
  24. 24.
    Yang CN, Chen TS, Yu KH, Wang CC (2007) Improvements of image sharing with steganography and authentication. J Syst Softw 80(7):1070–1076CrossRefGoogle Scholar
  25. 25.
    Zhao JJ, Zhang JZ, Zhao R (2007) A practical verifiable multi-secret sharing scheme. Comput Stand Interfaces 29(1):138–141CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  1. 1.School of SoftwareDalian University of TechnologyDalianChina
  2. 2.Department of Information Engineering and Computer ScienceFeng Chia UniversityTaichungRepublic of China
  3. 3.Department of Biomedical Imaging and Radiological ScienceChinese Medical UniversityTaichungTaiwan

Personalised recommendations