Skip to main content

Authenticated Secret Sharing Scheme Based on GMEMD

  • Conference paper
  • First Online:
Digital-Forensics and Watermarking (IWDW 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9569))

Included in the following conference series:

Abstract

In secret image sharing schemes, all legal participants provide legitimate shared images and then they can extract the correct secret message. Recently, Wu et al. proposed a high quality data hiding secret sharing scheme with authentication ability. The major contribution of this scheme maintains good stego image quality while being able to verify secret message integrity. However, to ensure the process can work, the secret image’s pixel values larger than 250 must be changed to 250 for Wu’s scheme. Otherwise, extracting the secret image may fail. In other words, for a secret image, a few errors do not make the big difference but it could be distorted severely for some sensitive secrets. In order to improve this shortcoming, a secret image sharing scheme based on General Multi-Exploiting Modification Direction (GMEMD) data hiding technology will be proposed in this paper. According to simulation results and analysis, we can show that the stego image quality in Wu et al.’s scheme or our proposed scheme is larger than 43dB. We also demonstrate the authentication capability to find unauthorized participants. Furthermore, if all participants are legitimate, then the proposed scheme can extract the secret completely without any distortion.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chang, C.C., Hsieh, Y.P., Lin, C.H.: Sharing secrets in stego images with authentication. Pattern Recogn. 41, 3130–3137 (2008)

    Article  MATH  Google Scholar 

  2. Chang, C.C., Huynh, N.T., Le, H.D.: Lossless and unlimited multi-image sharing based on chinese remainder theorem and lagrange interpolation. Sig. Process. 99, 159–170 (2014)

    Article  Google Scholar 

  3. Fridrich, J., Goljan, M., Du, R.: Detecting LSB steganography in color and grayscale images. IEEE Comput. Soc. 8(4), 22–28 (2001)

    Google Scholar 

  4. Guo, C., Chang, C.C., Qin, C.: A hierarchical threshold secret image sharing. Pattern Recogn. Lett. 33, 83–91 (2012)

    Article  Google Scholar 

  5. Kuo, W.C., Kuo, S.H., Wuu, L.C.: The high embedding steganographic method based on general Multi-EMD. In: 2012 International Conference on Information Security and Intelligent Control, pp. 286–289, August 2012

    Google Scholar 

  6. Lin, P.Y., Lee, J.S., Chang, C.C.: Distortion-free secret image sharing mechanism using modulus operator. Pattern Recogn. 42, 886–895 (2009)

    Article  MATH  Google Scholar 

  7. Lin, P.Y., Chan, C.S.: Invertible secret image sharing with steganography. Pattern Recogn. Lett. 31, 1887–1893 (2010)

    Article  MathSciNet  Google Scholar 

  8. Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)

    Google Scholar 

  9. Ulutas, M., Ulutas, G., Nabiyev, V.V.: Invertible secret image sharing for gray level and dithered cover images. J. Syst. Softw. 86, 485–500 (2013)

    Article  Google Scholar 

  10. Wu, C.C., Kao, S.J., Hwang, M.S.: A high quality image sharing with steganography and adaptive authentication scheme. J. Syst. Softw. 84, 2196–2207 (2011)

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported in part by the Ministry of Science and Technology of the Republic of China under Contract No. MOST 104-2221-E-224-023.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wen-Chung Kuo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Kuo, WC., Kuo, SH., Chang, HY., Wuu, LC. (2016). Authenticated Secret Sharing Scheme Based on GMEMD. In: Shi, YQ., Kim, H., Pérez-González, F., Echizen, I. (eds) Digital-Forensics and Watermarking. IWDW 2015. Lecture Notes in Computer Science(), vol 9569. Springer, Cham. https://doi.org/10.1007/978-3-319-31960-5_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-31960-5_32

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-31959-9

  • Online ISBN: 978-3-319-31960-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics