4.7 Article

A Common Method of Share Authentication in Image Secret Sharing

Journal

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TCSVT.2020.3025527

Keywords

Image secret sharing; lossless recovery; share authentication; no pixel expansion

Funding

  1. Key Program of the National University of Defense Technology [ZK-17-02-07]
  2. National Natural Science Foundation of China [61602491]

Ask authors/readers for more resources

This paper presents an ISS scheme with separate share authentication abilities of both dealer participatory authentication and dealer nonparticipatory authentication for a (k, n)-threshold. The advantages of polynomial-based ISS and visual secret sharing are skillfully fused in the design, achieving low decryption complexity, lossless decryption and no pixel expansion. Experiments and theoretical analyses demonstrate the effectiveness of the designed scheme.
Because of the importance of digital images and their extensive application to digital watermarking, block chain, access control, identity authentication, distributive storage in the cloud and so on, image secret sharing (ISS) is attracting ever-increasing attention. Share authentication is an important issue in its practical application. However, most ISS schemes with share authentication ability require a dealer to participate in the authentication (namely, dealer participatory authentication). In this paper, we design an ISS for a (k, n)-threshold with separate share authentication abilities of both dealer participatory authentication and dealer nonparticipatory authentication. The advantages of polynomial-based ISS and visual secret sharing (VSS) are skillfully fused to achieve these two authentication abilities without sending a share by using a screening operation. In addition, the designed scheme has the characteristics of low decryption (authentication) complexity, lossless decryption and no pixel expansion. Experiments and theoretical analyses are performed to show the effectiveness of the designed scheme.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available