Abstract
In secret image sharing schemes, all legal participants provide legitimate shared images and then they can extract the correct secret message. Recently, Wu et al. proposed a high quality data hiding secret sharing scheme with authentication ability. The major contribution of this scheme maintains good stego image quality while being able to verify secret message integrity. However, to ensure the process can work, the secret image’s pixel values larger than 250 must be changed to 250 for Wu’s scheme. Otherwise, extracting the secret image may fail. In other words, for a secret image, a few errors do not make the big difference but it could be distorted severely for some sensitive secrets. In order to improve this shortcoming, a secret image sharing scheme based on General Multi-Exploiting Modification Direction (GMEMD) data hiding technology will be proposed in this paper. According to simulation results and analysis, we can show that the stego image quality in Wu et al.’s scheme or our proposed scheme is larger than 43dB. We also demonstrate the authentication capability to find unauthorized participants. Furthermore, if all participants are legitimate, then the proposed scheme can extract the secret completely without any distortion.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Chang, C.C., Hsieh, Y.P., Lin, C.H.: Sharing secrets in stego images with authentication. Pattern Recogn. 41, 3130–3137 (2008)
Chang, C.C., Huynh, N.T., Le, H.D.: Lossless and unlimited multi-image sharing based on chinese remainder theorem and lagrange interpolation. Sig. Process. 99, 159–170 (2014)
Fridrich, J., Goljan, M., Du, R.: Detecting LSB steganography in color and grayscale images. IEEE Comput. Soc. 8(4), 22–28 (2001)
Guo, C., Chang, C.C., Qin, C.: A hierarchical threshold secret image sharing. Pattern Recogn. Lett. 33, 83–91 (2012)
Kuo, W.C., Kuo, S.H., Wuu, L.C.: The high embedding steganographic method based on general Multi-EMD. In: 2012 International Conference on Information Security and Intelligent Control, pp. 286–289, August 2012
Lin, P.Y., Lee, J.S., Chang, C.C.: Distortion-free secret image sharing mechanism using modulus operator. Pattern Recogn. 42, 886–895 (2009)
Lin, P.Y., Chan, C.S.: Invertible secret image sharing with steganography. Pattern Recogn. Lett. 31, 1887–1893 (2010)
Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)
Ulutas, M., Ulutas, G., Nabiyev, V.V.: Invertible secret image sharing for gray level and dithered cover images. J. Syst. Softw. 86, 485–500 (2013)
Wu, C.C., Kao, S.J., Hwang, M.S.: A high quality image sharing with steganography and adaptive authentication scheme. J. Syst. Softw. 84, 2196–2207 (2011)
Acknowledgments
This work was supported in part by the Ministry of Science and Technology of the Republic of China under Contract No. MOST 104-2221-E-224-023.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Kuo, WC., Kuo, SH., Chang, HY., Wuu, LC. (2016). Authenticated Secret Sharing Scheme Based on GMEMD. In: Shi, YQ., Kim, H., Pérez-González, F., Echizen, I. (eds) Digital-Forensics and Watermarking. IWDW 2015. Lecture Notes in Computer Science(), vol 9569. Springer, Cham. https://doi.org/10.1007/978-3-319-31960-5_32
Download citation
DOI: https://doi.org/10.1007/978-3-319-31960-5_32
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-31959-9
Online ISBN: 978-3-319-31960-5
eBook Packages: Computer ScienceComputer Science (R0)