K Out of N Secret Sharing Scheme with Steganography and Authentication
With communication, preservation and processing of information becoming digital, security of such transactions is a matter of prime concern. This has resulted in the development of encryption and cryptography. The degree of security of confidential data i
- PDF / 552,211 Bytes
- 13 Pages / 439.37 x 666.142 pts Page_size
- 53 Downloads / 212 Views
Abstract With communication, preservation and processing of information becoming digital, security of such transactions is a matter of prime concern. This has resulted in the development of encryption and cryptography. The degree of security of confidential data is measured by the involvement of one or more people —at times security is guaranteed when a single hand is involved, while at others secrets kept in parts by many ensures security. This has given rise to secret sharing that has emerged as a hot area of research in computer science in the past decade. Existing schemes of secret sharing suffer from pixel expansion and degradation in visual quality of the recovered secret and cover images. This paper aims to develop a steganography and authenticated image sharing (SAIS) scheme for gray and color images with meaningful shares and the authentication ability to detect the manipulation of shadow images. The main features of this scheme is the use of simple Boolean and arithmetic operations and thus the computational complexity is reduced from O(nlog2n) to O(n).
Keywords Threshold secret sharing scheme Access control Steganography Authentication Secret image sharing XOR Pixel expansion
1 Introduction In the intricately connected world of our times, all documents (text, images and multimedia) have to be stored in a database for future access and sharing. With the emergence of high-speed networks and cloud computing infrastructure, it has become common practice to process and handle highly confidential information as images, and to share them with other users. For example, in medical applications P. Mohamed Fathimal (&) P. Arockia Jansi Rani Department of Computer Science and Engineering, Manonmaniam Sundaranar University, Tirunelveli, Tamil Nadu, India e-mail: [email protected] © Springer Science+Business Media Singapore 2016 M. Senthilkumar et al. (eds.), Computational Intelligence, Cyber Security and Computational Models, Advances in Intelligent Systems and Computing 412, DOI 10.1007/978-981-10-0251-9_39
413
414
P. Mohamed Fathimal and P. Arockia Jansi Rani
such as tele-diagnosis and tele-consultation information exchange is required over a highly secure network. For such an exchange, medical records are computerized at clinics and hospitals in the form of EMR (Electronic Medical Records). Another usage is to create a single patient record system, which is shared among hospitals to avoid multiple entries and help build a consistent medical history of patients. On the flipside of such record keeping is that the confidential images might be destroyed intentionally or accidentally if they are held in a single place or a single person. Therefore, protection of integrity and confidentiality of the images is of paramount importance in such exchanges. The second issue is the need to keep invaders unaware of not only the content of the secret image itself but also of the very fact that an image is being transferred. A (k, n) threshold secret sharing scheme is a cryptographic technique designed to d
Data Loading...