Welcome To WUJNS
武汉大学学报 英文版 | Wuhan University Journal of Natural Sciences
Wan Fang
CNKI
CSCD
Wuhan University
Latest Article
A Verifiable Secret Image Sharing Scheme Based on Compressive Sensing
Time:2018-5-25  
LI Xinyan, XIAO Di,MOU Huajian, ZHANG Rui
1. School of Mathematics and Statistics, Yangtze Normal University, Chongqing 408100, China; 2. College of Computer Science, Chongqing University, Chongqing 400044, China; 3. College of Computer Engineering, Yangtze Normal University, Chongqing 408100, China
Abstract:
This paper proposes a verifiable secret image sharing scheme based on compressive sensing, secret sharing, and image hashing. In this scheme, Toeplitz matrix generated by two chaotic maps is employed as measurement matrix. With the help of Shamir threshold scheme and image hashing, the receivers can obtain the stored values and the hash value of image. In the verifying stage and restoring stage, there must be at least t legal receivers to get the effective information. By comparing the hash value of the restored image with the hash value of original image, the scheme can effectively prevent the attacker from tampering or forging the shared images. Experimental results show that the proposed scheme has good recovery performance, can effectively reduce space, and is suitable for real-time transmission, storage, and verification.
Key words:compressive sensing; secret sharing; measurement matrix; image hashing
CLC number:TP 309
References:
[1]	Shamir A. How to share a secret [J]. Communication of ACM, 1979, 24(11): 612-613.
[2]	Blakley R. Safeguarding cryptographic keys [C] // AFIPS National Computer Conference. Piscataway: IEEE, 1979: 313-317.
[3]	Chang C C, Huynh N T, Le H D. Lossless and unlimited multi-image sharing based on Chinese remainder theorem and Lagrange interpolation [J]. Signal Process, 2014, 99: 159-170.
[4]	Chen C C, Wu W J. A secure Boolean-based multi secret image sharing scheme [J]. Journal of Systems and Software, 2014, 92: 107-114.
[5]	Guo C, Chang C C, Qin C. A multi-threshold secret image sharing scheme based on MSP [J]. Pattern Recognition Letters, 2012, 3(12): 1594-1600.
[6]	Islam N, Puech W, Hayat K, et al. Application of homomorphism to secure image sharing [J]. Optics Communications, 2011, 284(19): 4412-4429.
[7]	Li L, Latif A A, Niu X. Elliptic curve ELGamal based ho-momorphic image encryption scheme for sharing secret images [J]. Signal Processing, 2012, 92(4): 1069-1078.
[8]	Faraoun K M. Design of a new efficient and secure mul-ti-secret images sharing scheme [J]. Multimedia Tools and Applications, 2017, 76: 1-15.
[9]	Yang C N, Chen C H, Cai S R. Enhanced Boolean-based multi-secret image sharing scheme [J]. Journal of Systems and Software, 2016, 116: 22-24.
[10]	Deng X, Wen W, Shi Z. Threshold multi-secret sharing scheme based on phase-shifting interferometry [J]. Optics Communications, 2017, 387(15): 409-414.
[11]	Faraoun K M. A novel fast and provably secure (t,n)-threshold secret sharing construction for digital images [J]. Journal of Information Security and Applications, 2014, 19(6): 331- 340.
[12]	Liu L, Wang A H, Chang C C. A novel real-time and progressive secret image sharing with flexible shadows based on compressive sensing [J]. Signal Processing: Image Communication, 2014, 29(1): 128-134.
[13]	Huang C P, Li C C. A secret image sharing method using integer wavelet transform [J]. EURASIP Journal on Advances in Signal Processing, 2007, 2: 263-281.
[14]	Huang C P. Secure, error-resilient, and real-time progressive image transmission [J]. Optical Engineering, 2009, 48(12): 127-139.
[15]	Donoho D L. Compressed sensing [J]. IEEE Transactions on Information Theory, 2006, 52(4): 1289-1306.
[16]	Xiao D, Deng M, Zhu X. A reversible image authentication scheme based on compressive sensing [J]. Multimedia Tools and Applications, 2015, 74(18): 7729-7752.
Welcome To WUJNS

HOME | Aim and Scope | Editoral Board | Current Issue | Back Issue | Subscribe | Crosscheck | Polishing | Contact us Copyright © 1997-2018 All right reserved