Abstract

-threshold secret image sharing (SIS) protects an image by dividing it into n shadow images. The secret image will be recovered as we gather k or more shadow images. In complex networks, the security, robustness and efficiency of protecting images draws more and more attention. Thus, we realize multiple secret images sharing (MSIS) by information hiding in the sharing domain (IHSD) and propose a novel and general -threshold IHSD-MSIS scheme (IHSD-MSISS), which can share and recover two secret images simultaneously. The proposed scheme spends less cost on managing and identifying shadow images, and improves the ability to prevent malicious tampering. Moreover, it is a novel approach to transmit important images with strong associations. The superiority of -threshold IHSD-MSISS is in fusing the sharing phases of two secret images by controlling randomness of SIS. We present a general construction model and algorithms of the proposed scheme. Sufficient theoretical analyses, experiments and comparisons show the effectiveness of the proposed scheme.

Highlights

  • Secret image sharing (SIS) is a significant branch in multi-party security cryptosystems [1,2], which originates from secret sharing (SS) introduced by Shamir in 1979. (k, n)threshold SS can process private data into n shares managed by different members

  • We propose a general (n, n)-threshold in the sharing domain (IHSD)-MSIS scheme (MSISS) to improve existent MSISSs, which based on IHSD [25] is a novel and undivided MSISS

  • Algorithms (n, n)-threshold IHSD-MSISS includes sharing and recovery phases which are separately presented in Algorithms 2 and 3, and we provide the corresponding flow charts shown in Figures 2 and 3

Read more

Summary

Introduction

Secret image sharing (SIS) is a significant branch in multi-party security cryptosystems [1,2], which originates from secret sharing (SS) introduced by Shamir in 1979. (k, n)threshold SS can process private data into n shares managed by different members. (k, n)threshold SS can process private data into n shares managed by different members. As a special format of data, images seldom raise suspicion by the attackers and can cover much information. SIS realizes information sharing based on images. With the development of network technology, users are increasingly demanding the security, robustness and efficiency of secret image transmission. When plenty of secret images are delivered by SIS in cloud computing, it is difficult for users to manage and search among shadow images which are all noise-like and indistinguishable. These shadow images suffer from the risk of being tampered with. Conventional methods like encryption and marking are incapable of balancing the effectiveness and safety and preventing malicious tampering

Methods
Results
Discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call