A Robust and Secure Image Sharing Scheme with Personal Identity Information Embedded
Ping Wang,Xing He,Yushu Zhang,Wenying Wen,Ming Li
DOI: https://doi.org/10.1016/j.cose.2019.04.010
IF: 5.105
2019-01-01
Computers & Security
Abstract:In a ( t, n )-threshold secret image sharing (SIS) scheme, the secrecy of a secret image relies on check and balance among participants. Unfortunately, the decentralized management also brings an underlying security flaw, i.e., once an attacker impersonates an authorized participant to submit a fake shadow for reconstruction no information about the secret image can be revealed. In order to resist such an identity-based attack, a novel SIS scheme with identity-based authentication is proposed, where a natural image is encoded through compressive sensing and then the compressive image is divided into n shadows (i.e., shares) according to an innovate way in which the production of shadows is controlled by participants’ identification number. Only when any t or more authorized participants cooperate together can the original image be reconstructed. Besides, a simple but efficient non-uniform scalar quantization method and a group communication protocol are presented to perfect the proposed scheme. Performance and security analyses indicate that our scheme possesses many advantages, including no pixel expansion, flexible shadow size, progressive display capability, error-resilient capability, no necessity for secure channels, and high security against statistical attack, brute-force attack, and identity-based attack.