Secret image sharing is a technique to share a secret image among a set of n participants. A trusted third party embeds the secret image into the cover image to generate shadow images such that at least t or more shadow images can reconstruct the secret image. In this paper, we consider an extreme and real-world situation, in which there is no one who is trusted by anyone else. In the proposed scheme, the participants can act as a dealer and communicate with each other in a secret channel. Each participant can generate her/his own shadow image independently, according to the cover image and the secret image. Experimental results are provided to show that the shadow images have satisfactory quality. In addition, our scheme has a large embedding capacity, and the secret image can be reconstructed losslessly.
(n, t, n) secret sharing Modulo operator Additive homomorphism Secret image sharing Trusted third party
This is a preview of subscription content, log in to check access.
This work was supported by the Fundamental Research Funds for the Central Universities under grants DUT12RC(3)80.
Blakley G (1979) Safeguarding cryptographic keys. In: Proceedings of the National Computer Conference. pp 313–317Google Scholar
Chang CC, Lin CC, Le Ngan TH, Le HB (2009) Sharing a verifiable secret image using two shadows. Pattern Recogn 42(11):3097–3114CrossRefMATHGoogle Scholar
Eslami Z, Ahmadabadi JZ (2011) Secret image sharing with authentication-chaining and dynamic embedding. J Syst Softw 84(5):803–809CrossRefGoogle Scholar
Eslami Z, Razzaghi SH, Ahmadabadi JZ (2010) Secret image sharing based on cellular automata and steganography. Pattern Recogn 43(1):397–404CrossRefMATHGoogle Scholar
Guo C, Chang CC, Qin C (2012) A multi-threshold secret image sharing scheme based on MSP. Pattern Recognit Lett 33(12):1594–1600CrossRefGoogle Scholar
Guo C, Chang CC, Qin C (2012) A hierarchical threshold secret image sharing. Pattern Recognit Lett 33(1):83–91CrossRefGoogle Scholar
Harn L (1995) Efficient sharing (broadcasting) of multiple secret. IEE Proc Comput Digit Tech 142(3):237–240CrossRefGoogle Scholar
Hwang RJ, Chang CC (1998) An on-line secret sharing scheme for multi-secrets. Comput Commun 21(13):1170–1176CrossRefGoogle Scholar
Ingemarsson I, Simmons GJ (1991) A protocol to set up shared secret schemes without the assistance of a mutually trusted party. In: Damgård IB (ed) Advances in cryptology, proceedings of the eurocrypt’90. Springer, Aarhus, pp 266–282Google Scholar