Abstract
Secret image sharing (SIS) techniques allow visual secrets to be shared between multiple people. These techniques require a predetermined access structure to be satisfied to reveal the secret. SIS schemes have the potential to increase security in several applications including telemedicine and image transfer in the cloud computing environment, providing controlled access to confidential images. To date, a significant number of SIS schemes with various properties and access structures have been proposed. Among them, hierarchical SIS (HSIS) is considered foremost since almost all organizations and associations manage their secret information in a hierarchical manner. However, the HSIS scheme tends to suffer from security flaws as the secret image can often be visually leaked, even when the access structure is not properly satisfied. To avoid this security flaw, we propose a cheating prevention mechanism by introducing a robust watermarking technique based on the Quantization Index Modulation-Dither Modulation (QIM-DM) algorithm in the discrete cosine transform (DCT) domain. Experimental results demonstrate the superior effectiveness of our proposed cheating prevention mechanism. Furthermore, our approach retains all of the desirable properties of the HSIS scheme.
Similar content being viewed by others
References
Alvarez G, Hernández-Encinas L, Martín del Rey A (2008) A multisecret sharing scheme for color images based on cellular automata. Inf Sci 178:4382–4395
Blakley GR (1979) Safeguarding cryptographic keys. AFIPS National Computer Conf 48:313–317
Chang CC, Hsieh YP, Lin CH (2008) Sharing secret in stego images with authentication. Pattern Recogn 41:3130–3137
Chen B, Wornell GW (2001) Quantization index modulation: a class of provably good method for digital watermarking and information embedding. IEEE Trans Inform Theor 47:1423–1443
Chen TH, Wu CS (2011) Efficient multi-secret image sharing based on Boolean operation. Signal Process 91:90–97
Eslami Z, Razzaghi SH, Ahmadabadi JZ (2012) Secret image sharing based on cellular automata and steganography. Pattern Recogn 43:397–404
Guo C, Chang CC, Qin C (2012) A Hierarchical threshold secret image sharing. Pattern Recogn Lett 33:83–91
Guo C, Chang CC, Qin C (2014) A novel (n, t, n) secret image sharing scheme without a trusted third party. Multimed Tools Appl 72:2195–2209
Lin PY, Chan CS (2010) Invertible secret image sharing with steganography. Pattern Recogn Lett 31:1887–1893
Lin CC, Tsai WH (2004) Secret image sharing with steganography and authentication. J Syst Software 73:405–414
Naor M, Shamir A (1995) Visual cryptography. advances in cryptography: Eurocrypt’94. Lecture Note Comput Sci 950:1–12
Shamir A (1979) How to share a secret. Comm ACM 22:612–613
Tassa T (2007) Hierarchical threshold secret sharing. L Cryptol 20:237–264
Thien CC, Lin JC (2002) Secret image sharing. Comput Graph 26:765–770
Ulutas G, Ulutas M, Nabiyev V (2013) Secret image sharing scheme with adaptive authentication strength. Pattern Recogn Lett 34:283–291
Yang CN, Chen TS, Yu KH, Wang CC (2007) Improvements of image sharing with steganography and authentication. J Syst Software 80:1070–1076
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Espejel-Trujillo, A., Nakano-Miyatake, M., Olivares-Mercado, J. et al. A cheating-prevention mechanism for hierarchical secret-image-sharing using robust watermarking. Multimed Tools Appl 75, 7855–7873 (2016). https://doi.org/10.1007/s11042-015-2701-7
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-015-2701-7