A $ (k, n) $ threshold secret image sharing (SIS) scheme divides a secret image into $ n $ shadows. One can reconstruct the secret image only when holding $ k $ or more than $ k $ shadows but cannot know any information on the secret from fewer than $ k $ shadows. Based on this characteristic, SIS has been widely used in access control, information hiding, distributed storage and other areas. Verifiable SIS aims to prevent malicious behaviour by attackers through verifying the authenticity of shadows and previous works did not solve this problem well. Our contribution is that we proposed a verifiable SIS scheme which combined CRT-based SIS and $ (2, n+1) $ threshold visual secret sharing(VSS). Our scheme is applicable no matter whether there exists a third party dealer. And it is worth mentioning that when the dealer is involved, our scheme can not only detect fake participants, but also locate dishonest participants. In general, loose screening criterion and efficient encoding and decoding rate of CRT-based SIS guarantee high-efficiency shadows generation and low recovery computation complexity. The uncertainty of the bits used for screening prevents malicious behavior by dishonest participants. In addition, our scheme has the advantages of lossless recovery, no pixel expansion and precise detection.
Citation: Jingju Liu, Lei Sun, Jinrui Liu, Xuehu Yan. Fake and dishonest participant location scheme in secret image sharing[J]. Mathematical Biosciences and Engineering, 2021, 18(3): 2473-2495. doi: 10.3934/mbe.2021126
A $ (k, n) $ threshold secret image sharing (SIS) scheme divides a secret image into $ n $ shadows. One can reconstruct the secret image only when holding $ k $ or more than $ k $ shadows but cannot know any information on the secret from fewer than $ k $ shadows. Based on this characteristic, SIS has been widely used in access control, information hiding, distributed storage and other areas. Verifiable SIS aims to prevent malicious behaviour by attackers through verifying the authenticity of shadows and previous works did not solve this problem well. Our contribution is that we proposed a verifiable SIS scheme which combined CRT-based SIS and $ (2, n+1) $ threshold visual secret sharing(VSS). Our scheme is applicable no matter whether there exists a third party dealer. And it is worth mentioning that when the dealer is involved, our scheme can not only detect fake participants, but also locate dishonest participants. In general, loose screening criterion and efficient encoding and decoding rate of CRT-based SIS guarantee high-efficiency shadows generation and low recovery computation complexity. The uncertainty of the bits used for screening prevents malicious behavior by dishonest participants. In addition, our scheme has the advantages of lossless recovery, no pixel expansion and precise detection.
[1] | Y. Luo, X. Ouyang, J. Liu, L. Cao, An image encryption method based on elliptic curve elgamal encryption and chaotic systems, IEEE Access, 7 (2019), 38507-38522. doi: 10.1109/ACCESS.2019.2906052 |
[2] | G. Ye, K. Jiao, H. Wu, C. Pan, X. Huang, An asymmetric image encryption algorithm based on a fractional-order chaotic system and the rsa public-key cryptosystem, Int. J. Bifurcation Chaos, 30 (2020), 2050233. doi: 10.1142/S0218127420502338 |
[3] | Q. Su, G. Wang, S. Jia, X. Zhang, Q. Liu, X. Liu, Embedding color image watermark in color image based on two-level DCT, Signal, Image Video Process., 9 (2015), 991-1007. doi: 10.1007/s11760-013-0534-2 |
[4] | N. M. Makbol, B. E. Khoo, T. H. Rassem, Block-based discrete wavelet transform-singular value decomposition image watermarking scheme using human visual system characteristics, IET Image process., 10 (2016), 34-52. doi: 10.1049/iet-ipr.2014.0965 |
[5] | N. R. Zhou, A. W. Luo, W. P. Zou, Secure and robust watermark scheme based on multiple transforms and particle swarm optimization algorithm, Multimedia Tools Appl., 78 (2019), 2507-2523. doi: 10.1007/s11042-018-6322-9 |
[6] | N. R. Zhou, A. W. Luo, W. P. Zou, Compressed sensing, IEEE Trans. Inf. Theory, 52 (2006), 1289-1306. |
[7] | E. J. Candes, J. Romberg, T. Tao, Robust uncertainty principles: Exact signal reconstruction from highly incomplete frequency information, IEEE Trans. Inf. Theory, 52 (2006), 489-509. doi: 10.1109/TIT.2005.862083 |
[8] | G. Ye, C. Pan, Y. Dong, K. Jiao, X. Huang, A novel multi-image visually meaningful encryption algorithm, based on compressive sensing and Schur decomposition, Trans. Emerg. Telecommun. Technol., 32 (2021), e4071. |
[9] | G. R. Blakley, Safeguarding cryptographic keys, in 1979 International Workshop on Managing Requirements Knowledge (MARK), (1979), 313-318. |
[10] | A. Shamir, How to share a secret, Commun. ACM, 22 (1979), 612-613. doi: 10.1145/359168.359176 |
[11] | A. Gutub, N. Al-Juaid, E. Khan, Counting-based secret sharing technique for multimedia applications, Multimedia Tools Appl., 78 (2019), 5591-5619. doi: 10.1007/s11042-017-5293-6 |
[12] | M. Al-Ghamdi, M. Al-Ghamdi, A. Gutub, Security enhancement of shares generation process for multimedia counting-based secret-sharing technique, Multimedia Tools Appl., 78 (2019), 16283-16310. doi: 10.1007/s11042-018-6251-7 |
[13] | A. Gutub, M. Al-Ghamdi, Image based steganography to facilitate improving counting-based secret sharing, 3D Res., 10 (2019), 6. doi: 10.1007/s13319-019-0216-0 |
[14] | A. Gutub, M. Al-Ghamdi, Hiding shares by multimedia image steganography for optimized counting-based secret sharing, Multimedia Tools Appl., 79 (2020), 1-35. doi: 10.1007/s11042-019-7523-6 |
[15] | M. Naor, A. Shamir, Visual cryptography, in Workshop on the Theory and Application of of Cryptographic Techniques, (1994), 1-12. |
[16] | C. C. Thien, J. C. Lin, Secret image sharing, Comput. Graphics, 26 (2002), 765-770. doi: 10.1016/S0097-8493(02)00131-0 |
[17] | X. Yan, Y. Lu, L. Liu, S. Wan, H. Liu, Chinese remainder theorem-based secret image sharing for (k, n) threshold, in Cloud Computing and Security, Springer, 10603 (2017), 433-440. |
[18] | X. Yan, Y. Lu, L. Liu, X. Song, Reversible image secret sharing, IEEE Trans. Inf. Forensics Secur., 15 (2020), 3848-3858. |
[19] | B. Chor, S. Goldwasser, S. Micali, B. Awerbuch, Verifiable secret sharing and achieving simultaneity in the presence of faults, in Proceedings of the IEEE 26th Annual Symposium on Foundations of Computer Science 1985, (1985), 383-395. |
[20] | P. Li, P. Ma, X. Su, Image secret sharing and hiding with authentication, in 2010 First International Conference on Pervasive Computing, Signal Processing and Applications, (2010), 367-370. |
[21] | G. Ulutas, M. Ulutas, V. V. Nabiyev, Secret image sharing scheme with adaptive authentication strength, Pattern Recognit. Lett., 34 (2013), 283-291. doi: 10.1016/j.patrec.2012.10.017 |
[22] | C. C. Lin, W. H. Tsai, Secret image sharing with steganography and authentication, J. Syst. Software, 73 (2004), 405-414. doi: 10.1016/S0164-1212(03)00239-5 |
[23] | C. C. Chang, Y. P. Hsieh, C. H. Lin, Sharing secrets in stego images with authentication, Pattern Recognit., 41 (2008), 3130-3137. doi: 10.1016/j.patcog.2008.04.006 |
[24] | M. T. Parvez, A. Gutub, Vibrant color image steganography using channel differences and secret data distribution, Kuwait J. Sci. Eng., 38 (2011), 127-142. |
[25] | Y. Liu, C. C. Chang, A turtle shell-based visual secret sharing scheme with reversibility and authentication, Multimedia Tools Appl., 77 (2018), 25295-25310. doi: 10.1007/s11042-017-5327-0 |
[26] | A. Gutub, K. Alaseri, Hiding shares of counting-based secret sharing via Arabic text steganography for personal usage, Arabian J. Sci. Eng., 45 (2019), 2433-2458. |
[27] | X. Yan, Q. Gong, L. Li, G. Yang, Y. Lu, J. Li, Secret image sharing with separate shadow authentication ability, Signal Process. Image Commun., 82 (2020), 115721. doi: 10.1016/j.image.2019.115721 |
[28] | G. Yang, L. Liu, X. Yan, A compressed secret image sharing method with shadow image verification capability, Math. Biosci. Eng., 17 (2020), 4295-4316. doi: 10.3934/mbe.2020237 |
[29] | Y. Jiang, X. Yan, J. Qi, Y. Lu, X. Zhou, Secret Image Sharing with Dealer-Participatory and Non-Dealer-Participatory Mutual Shadow Authentication Capabilities, Mathematics, 8 (2020), 234. doi: 10.3390/math8020234 |
[30] | X. Yan, Y. Lu, C. N. Yang, X. Zhang, S. Wang, A Common method of share authentication in image secret sharing, IEEE Trans. Circuits Syst. Video Technol., (2020), 1-1. |
[31] | S. M. Yen, S. Kim, S. Lim, S. J. Moon, RSA speedup with Chinese remainder theorem immune against hardware fault cryptanalysis, IEEE Trans. Comput., 52 (2003), 461-472. doi: 10.1109/TC.2003.1190587 |
[32] | W. Wang, X. G. Xia, A closed-form robust Chinese remainder theorem and its performance analysis, IEEE Trans. Signal Process., 58 (2010), 5655-5666. doi: 10.1109/TSP.2010.2066974 |
[33] | C. Li, Y. Liu, L. Y. Zhang, K. W. Wong, Cryptanalyzing a class of image encryption schemes based on Chinese remainder theorem, Signal Process. Image Commun., 29 (2014), 914-920. doi: 10.1016/j.image.2014.06.011 |
[34] | K. Okeya, T. Takagi, Security analysis of CRT-based cryptosystems, in International Conference on Applied Cryptography and Network Security, (2004), 383-397. |
[35] | X. Yan, X. Liu, C. N. Yang, An enhanced threshold visual secret sharing based on random grids, J. Real-Time Image Process., 14 (2018), 61-73. doi: 10.1007/s11554-015-0540-4 |