JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Reversible Secret Sharing Scheme Using Symmetric Key Encryption Algorithm in Encrypted Images
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Reversible Secret Sharing Scheme Using Symmetric Key Encryption Algorithm in Encrypted Images
Jeon, Byoung-Hyun; Shin, Sang-Ho; Jung, Ki-Hyun; Lee, Joon-Ho; Yoo, Kee-Young;
  PDF(new window)
 Abstract
This paper proposes a novel reversible secret sharing scheme using AES algorithm in encrypted images. In the proposed scheme, a role of the dealer is divided into an image provider and a data hider. The image provider encrypts the cover image with a shared secret key and sends it to the dealer. The dealer embeds the secret data into the encrypted image and transmits encrypted shadow images to the corresponding participants. We utilize Galois polynomial arithmetic operation over 28 and the coefficient of the higher-order term is fixed to one in order to prevent the overflow. In experimental results, we demonstrate that the PSNR is sustained close to 44dB and the embedding capacity is 524,288 bits.
 Keywords
Reversible Secret Image Sharing;Encrypted Images;Symmetric Key Encryption Algorithm;Information Hiding;
 Language
Korean
 Cited by
 References
1.
D.R. Stinson, Cryptography Theory and Practice, Chapman & Hall/CRC Press, United States of America, 2006.

2.
S. William, Cryptography and Network Security, Prentice Hall, United States of America, 2006.

3.
A.J. Menezes, P.C. Van Oorschot, and S.A. Vanstone, Handbook of Applied Cryptography, CRC Press, United States of America, 1996.

4.
A. Shamir, “How to Share a Secret,” Communications of ACM, Vol. 22, No. 11, pp. 612-613, 1979. crossref(new window)

5.
I. Mitsuru, S. Akira, and N. Takao, "Secret Sharing Scheme Realizing General Access Structure," Electronics and Communications in Japan, Vol. 72, Issue 9, pp. 1520-6440, 1989.

6.
S. Berry, "A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic Voting," Advances in Cryptology-CRYPTO'99 Lecture Notes in Computer Science, Vol. 1666, pp. 148-164, 1999.

7.
F. Paul, "A Practical Scheme for Non-Interactive Verifiable Secret Sharing," Proceeding of 28th Annual Symposium on Foundations of Computer Science, pp. 427-438, 1987.

8.
B. Josh and L. Jerry, "Generalized Secret Sharing and Monotone Functions," Advances in Cryptology-CRYPTO'88 Lecture Notes in Computer Science, Vol. 403, pp. 27-35, 1990.

9.
A. Beimel and B. Chor, “Secret Sharing with Public Reconstruction,” IEEE Transactions on Information Theory, Vol. 44, No. 5, pp. 1887-1896, 1998. crossref(new window)

10.
C. Thien and J. Lin, “Secret Image Sharing,” Computers & Graphics, Vol. 26, No. 5, pp. 765-770, 2002. crossref(new window)

11.
C. Thien and J. Lin, “An Image Sharing Method with User-friendly Shadow Images,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, No. 12, pp. 1161-1169, 2003. crossref(new window)

12.
C. Yang, T. Chen, K. Yu, and C. Wang, “Improvements of Image Sharing with Steganography and Authentication,” Journal of Systems & Software, Vol. 80, No. 7, pp. 1070-1076, 2007. crossref(new window)

13.
C. Lin and W. Tsai, “Secret Image Sharing with Steganography and Authentication,” Journal of Systems and Software, Vol. 73, No. 3, pp. 405-414, 2004. crossref(new window)

14.
R. Wang and S. Shyu, “Scalable Secret Image Sharing,” Journal of Signal Processing: Image Communication, Vol. 22, No. 4, pp. 363-373, 2007. crossref(new window)

15.
C. Chang, Y. Hsieh, and C. Lin, “Sharing Secrets in Stego Images with Authentication,” Journal of Pattern Recognition, Vol. 41, No. 10, pp. 3130-3137, 2008. crossref(new window)

16.
C. Lin, L. Liao, K. Hwang, and S. Chen, “Reversible Secret Image Sharing with High Visual Quality,” Multimedia Tools and Applications, Vol. 70, No. 3, pp. 1729-1747, 2014. crossref(new window)

17.
U. Mustafa, G. Ulutas, and V.V. Nabiyev, “Invertible Secret Image Sharing for Gray Level and Dithered Cover Images,” Journal of Systems and Software, Vol. 86, No. 2, pp. 485-500, 2013. crossref(new window)

18.
B. Jeon, G. Lee, K. Jung and K. Yoo, “Reversible Secret Image Sharing Scheme Using Histogram Shifting and Difference Expansion,” Journal of Korea Multimedia Society, Vol. 17, No. 7, pp. 849-857, 2014. crossref(new window)

19.
X. Zhang, “Reversible Data Hiding in Encrypted Image,” IEEE Signal Processing Letters, Vol. 18, No. 4 pp. 255-258, 2011. crossref(new window)

20.
W. Hong, T. Chen, and H. Wu, “An Improved Reversible Data Hiding in Encrypted Images using Side Match,” IEEE Signal Processing Letters, Vol. 19, No. 4 pp. 199-202, 2012. crossref(new window)

21.
B. Jang, S. Lee, and K. Kwon, “Active Video Watermarking Technique for Infectious Information Hiding System,” Journal of Korea Multimedia Society, Vol. 15, No. 8, pp. 1017-1030, 2012 crossref(new window)

22.
S. Hyun, S. Shin, and K. Yoo, “A Proactive Secret Image Sharing Scheme over GF(28),” Journal of Korea Multimedia Society, Vol. 16, No. 5, pp. 577-590, 2013. crossref(new window)