Skip to main content
Log in

A cheating-prevention mechanism for hierarchical secret-image-sharing using robust watermarking

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Secret image sharing (SIS) techniques allow visual secrets to be shared between multiple people. These techniques require a predetermined access structure to be satisfied to reveal the secret. SIS schemes have the potential to increase security in several applications including telemedicine and image transfer in the cloud computing environment, providing controlled access to confidential images. To date, a significant number of SIS schemes with various properties and access structures have been proposed. Among them, hierarchical SIS (HSIS) is considered foremost since almost all organizations and associations manage their secret information in a hierarchical manner. However, the HSIS scheme tends to suffer from security flaws as the secret image can often be visually leaked, even when the access structure is not properly satisfied. To avoid this security flaw, we propose a cheating prevention mechanism by introducing a robust watermarking technique based on the Quantization Index Modulation-Dither Modulation (QIM-DM) algorithm in the discrete cosine transform (DCT) domain. Experimental results demonstrate the superior effectiveness of our proposed cheating prevention mechanism. Furthermore, our approach retains all of the desirable properties of the HSIS scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Alvarez G, Hernández-Encinas L, Martín del Rey A (2008) A multisecret sharing scheme for color images based on cellular automata. Inf Sci 178:4382–4395

    Article  MATH  Google Scholar 

  2. Blakley GR (1979) Safeguarding cryptographic keys. AFIPS National Computer Conf 48:313–317

    Google Scholar 

  3. Chang CC, Hsieh YP, Lin CH (2008) Sharing secret in stego images with authentication. Pattern Recogn 41:3130–3137

    Article  MATH  Google Scholar 

  4. Chen B, Wornell GW (2001) Quantization index modulation: a class of provably good method for digital watermarking and information embedding. IEEE Trans Inform Theor 47:1423–1443

    Article  MathSciNet  MATH  Google Scholar 

  5. Chen TH, Wu CS (2011) Efficient multi-secret image sharing based on Boolean operation. Signal Process 91:90–97

    Article  MATH  Google Scholar 

  6. Eslami Z, Razzaghi SH, Ahmadabadi JZ (2012) Secret image sharing based on cellular automata and steganography. Pattern Recogn 43:397–404

    Article  MATH  Google Scholar 

  7. Guo C, Chang CC, Qin C (2012) A Hierarchical threshold secret image sharing. Pattern Recogn Lett 33:83–91

    Article  Google Scholar 

  8. Guo C, Chang CC, Qin C (2014) A novel (n, t, n) secret image sharing scheme without a trusted third party. Multimed Tools Appl 72:2195–2209

    Article  Google Scholar 

  9. Lin PY, Chan CS (2010) Invertible secret image sharing with steganography. Pattern Recogn Lett 31:1887–1893

    Article  MathSciNet  Google Scholar 

  10. Lin CC, Tsai WH (2004) Secret image sharing with steganography and authentication. J Syst Software 73:405–414

    Article  Google Scholar 

  11. Naor M, Shamir A (1995) Visual cryptography. advances in cryptography: Eurocrypt’94. Lecture Note Comput Sci 950:1–12

    Article  MathSciNet  MATH  Google Scholar 

  12. Shamir A (1979) How to share a secret. Comm ACM 22:612–613

    Article  MathSciNet  MATH  Google Scholar 

  13. Tassa T (2007) Hierarchical threshold secret sharing. L Cryptol 20:237–264

    Article  MathSciNet  MATH  Google Scholar 

  14. Thien CC, Lin JC (2002) Secret image sharing. Comput Graph 26:765–770

    Article  Google Scholar 

  15. Ulutas G, Ulutas M, Nabiyev V (2013) Secret image sharing scheme with adaptive authentication strength. Pattern Recogn Lett 34:283–291

    Article  MATH  Google Scholar 

  16. Yang CN, Chen TS, Yu KH, Wang CC (2007) Improvements of image sharing with steganography and authentication. J Syst Software 80:1070–1076

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mariko Nakano-Miyatake.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Espejel-Trujillo, A., Nakano-Miyatake, M., Olivares-Mercado, J. et al. A cheating-prevention mechanism for hierarchical secret-image-sharing using robust watermarking. Multimed Tools Appl 75, 7855–7873 (2016). https://doi.org/10.1007/s11042-015-2701-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-015-2701-7

Keywords

Navigation