Abstract

In secret image sharing schemes, the threshold may have to be adjusted in case of changes in the security policy and the adversary structure before recovering the secret image. For example, if participants leave the group, their stego images are useless to them and may not be kept safely. As a result, these images can be easily stolen and utilized by intruders, which reduces the security of the scheme. To solve this problem, we propose a novel threshold changeable secret image sharing scheme withNpotential changeable thresholdst1,t2,…,tN. By preparing advance shares for thresholdst1,t2,…,tNand using the two-variable one-way function to generate the identification value, we can change the threshold when necessary. The experiments show that the quality of the stego images in our scheme is satisfactory and the secret image can be recovered without distortion. Moreover, the security analysis shows that we can change the threshold safely.

Highlights

  • The rapid development of Internet has brought much more convenience to people’s daily lives, but it has brought security risks

  • The shares are camouflaged in a cover image to form the stego images, which cannot be distinguished by the human eye, so these shares can be concealed from intruders

  • We focus on the performance when the potential thresholds were set as [3, 5] and [4, 5], and we observed that different potential thresholds had little effect on the quality of the stego images when tN and N were fixed

Read more

Summary

Introduction

The rapid development of Internet has brought much more convenience to people’s daily lives, but it has brought security risks. In order to solve this secret key protecting problem, Shamir [1] and Blakley [2] proposed (t, n) threshold secret sharing schemes independently. Shamir constructed his scheme based on polynomial interpolation, while Blakley provided a geometric construction. The random-noise-like images, which are meaningless, can attract malicious intruders’ attention. To solve this problem, Lin and Tsai [4] provided a (t, n) threshold image sharing scheme using steganography. Their scheme embeds watermarks into the stego images for verification

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.