Abstract:Conventional shadow image connection based(t,s,k,n) sharing is prone to different size shadow images and Birkhoff interpolation based(t,s,k,n) sharing leads to low recovery efficiency,while in double authentications based self-recovery image sharing,the recovery capabilities of secret image and backup image are very limited.To address these problems,random participation values were used to construct master key based(t,s,k,n) sharing by means of(k,s) and(k-t,n-s) schemes and MD5 values stored in the third party were used to prevent cheating.The proposed scheme scrambled LL subband of secret image by master key and formed multi-version backup images with different scrambling degrees where more backups for more significant bits.Restricted double authentication strategy can embed as many backup bits as possible while maintaining authentication accuracy by(k,n) sharing over GF(2^8) field to form stego carriers.Theoretical and experimental results show,master key based(t,s,k,n) scheme can be solved efficiently.Random participation values avoid the disclosure of participant numbers and prevent tampering distributed information or guessing authentication bits.Multi-version backup strategy can restore backup images with high confidence while authentication capability of restricted double authentication strategy is no less than that of double authentications based self-recovery image sharing scheme.
[1] Shamir A.How to share a secret[J].Communications of the Association for Computing Machinery,1979,22(11):612-613.
[2] Blakley G R.Safeguarding cryptographic keys[A].Proceedings of 1979 National Computer Conference[C].New York,USA:AFIPS,1979.48:313-317.
[3] Thien C C,Lin J C.Secret image sharing[J].Computers & Graphics,2002,26(5):765-770.
[4] Kanso A,Ghebleh M.An efficient(t,n)-threshold secret image sharing scheme[J].Multimedia Tools & Applications,2016,76(15):1-20.
[5] Lin C C,Tsai W H.Secret image sharing with steganography and authentication[J].Journal of Systems and Software,2004,73(3):405-414.
[6] Yang C N,Chen T S,Yu K H,et al.Improvements of image sharing with steganography and authentication[J].Journal of Systems and Software,2007,80(7):1070-1076.
[7] Chang C C,Hsieh Y P,Lin C H.Sharing secrets in stego images with authentication[J].Pattern Recognition,2008,41(10):3130-3137.
[8] Ulutas M,Ulutas G,Nabiyev V V.Secret image sharing with enhanced visual quality and authentication mechanism[J].The Imaging Science Journal,2011,59(3):154-165.
[9] 欧阳显斌,邵利平,陈文鑫.结合调整差值变换的(K,N)有意义图像分存方案[J].中国图象图形学报,2015,20(5):633-642. Ouyang Xianbin,Shao Liping,Chen Wenxin.Meaningful(K,N)image sharing scheme combined with the adjusting difference transformation[J].Journal of Image and Graphics,2015,20(5):633-642.(In Chinese)
[10] 欧阳显斌,邵利平.一种基于GF(23)的(K,N)有意义无扩张图像分存方案[J].计算机科学,2015,42(12):251-256. Ouyang Xianbin,Shao Liping.Meaningful(K,N)free expansion image sharing scheme based on GF(23)[J].Computer Science,2015,42(12):251-256.(in Chinese)
[11] Chang C C,Chen Y H,Wang H C.Meaningful secret sharing technique with authentication and remedy abilities[J].Information Sciences,2011,181(14):3073-3084.
[12] Chen Y H,Chang C C.Image tamper detection and recovery based on dual watermarks sharing strategy[J].Journal of Digital Information Management,2012,10(1):39-49.
[13] Wu X T,Sun W.Secret image sharing scheme with authentication and remedy abilities based on cellular automata and discrete wavelet transform[J].Journal of Systems and Software,2013,86(4):1068-1088.
[14] 欧阳显斌,邵利平,乐志芳.非等量备份和双认证自修复有限域图像分存[J].软件学报,2017,28(12):3306-3346. Ouyang Xianbin,Shao Liping,Le Zhifang.Gloise field self-recovery image sharing scheme with non-equivalent backup and double authentications[J].Journal of Software,2017,28(12):3306-3346.(in Chinese)
[15] Chan C K,Cheng L M.Hiding data in images by simple LSB substitution[J].Pattern Recognition,2004,37(3):469-474.
[16] Li P,Yang C N,Wu C C,et al.Essential secret image sharing scheme with different importance of shadows[J].Journal of Visual Communication & Image Representation,2013,24(7):1106-1114.
[17] Yang C N,Li P,Wu C C,et al.Reducing shadow size in essential secret image sharing by conjunctive hierarchical approach[J].Signal Processing Image Communication,2015,31:1-9.
[18] Li P,Yang C N,Zhou Z.Essential secret image sharing scheme with the same size of shadows[J].Digital Signal Processing,2016,50:51-60.
[19] 邵利平,覃征,衡星辰,等.基于矩阵变换的图像置乱逆问题求解[J].电子学报,2008,36(7):1355-1363. Shao Liping,Qin Zheng,Heng xingchen,et al.Solution for the inverse problem of matrix transform based image scrambling[J].Acta Electronica Sinica,2008,36(7):1355-1363.(in Chinese)
[20] 邵利平.数字图像置乱技术[M].北京:科学出版社,2016.56-94.