Next Article in Journal
Modified Inertial Hybrid and Shrinking Projection Algorithms for Solving Fixed Point Problems
Previous Article in Journal
A New Vision on the Prosumers Energy Surplus Trading Considering Smart Peer-to-Peer Contracts
Previous Article in Special Issue
SE-IYOLOV3: An Accurate Small Scale Face Detector for Outdoor Security
Open AccessArticle

Secret Image Sharing with Dealer-Participatory and Non-Dealer-Participatory Mutual Shadow Authentication Capabilities

National University of Defense Technology, Hefei 230037, China
*
Author to whom correspondence should be addressed.
Mathematics 2020, 8(2), 234; https://doi.org/10.3390/math8020234
Received: 15 January 2020 / Revised: 6 February 2020 / Accepted: 7 February 2020 / Published: 12 February 2020
(This article belongs to the Special Issue Computing Methods in Steganography and Multimedia Security)
A ( k , n ) threshold secret image sharing (SIS) method is proposed to divide a secret image into n shadows. The beauty of this scheme is that one can only reconstruct a secret image with k or more than k shadows, but one cannot obtain any information about the secret from fewer than k shadows. In the ( k , n ) threshold SIS, shadow authentication means the detection and location of manipulated shadows. Traditional shadow authentication schemes require additional bits for authentication; need much information to be public; or need to put each shadow into a host image, utilizing the information hiding technique, which makes the generation, recovery and authentication complexity higher. Besides, most existing schemes work when a dealer participates in recovery. Our contribution is that we propose a SIS method for a ( k , n ) threshold with dealer-participatory and non-dealer-participatory mutual shadow authentication capabilities which integrates polynomial-based SIS and visual secret sharing (VSS) through using the result of VSS to "guide" the polynomial-based SIS by a screening operation. In our scheme, when an authentication image is public, all involved actors (participants and dealer) can mutually authenticate each other by exchange the lowest level plane instead of the whole shadow. Our scheme is suitable for the case with and without a dealer participate recovery. In addition, the proposed scheme has characteristics of low generation and authentication complexity, no pixel expansion, 100% detection rate and lossless recovery.
Keywords: secret image sharing; verifiable secret sharing; shadow authentication; lossless recovery secret image sharing; verifiable secret sharing; shadow authentication; lossless recovery
MDPI and ACS Style

Jiang, Y.; Yan, X.; Qi, J.; Lu, Y.; Zhou, X. Secret Image Sharing with Dealer-Participatory and Non-Dealer-Participatory Mutual Shadow Authentication Capabilities. Mathematics 2020, 8, 234.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop