iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://unpaywall.org/10.1007/S11042-017-5097-8
A proactive secret image sharing scheme with resistance to machine learning based steganalysis | Multimedia Tools and Applications Skip to main content
Log in

A proactive secret image sharing scheme with resistance to machine learning based steganalysis

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In secret image sharing (SIS) schemes, a secret image is shared among a set of n images called stego-images. Each stego-image is preserved by a participant. In the recovery stage, at least k out of n stego-images are required to obtain the secret image, while k − 1 cannot reveal the secret in the sense of perfect secrecy. Hence, SIS guarantees long-term security. However, as the longer the stego-images remain stored, the higher is the probability of being vulnerable against steganalysis. To resolve this issue, this paper proposes the use of proactive secret sharing in an SIS scheme (P-SIS). P-SIS allows the stego-images to be renewed frequently while these are stored, without changing both cover and secret images. However, direct implementation of a proactive SIS requires more embedding rate (ER), causing high steganalysis accuracy detection and loss of quality in the stego-images. Our proposal addresses this issue and presents the combination of a (k, L, n)-threshold ramp secret sharing scheme and least significant bit matching (LSBM) steganography to reduce the steganalysis accuracy detection. The results of the evaluation show effectiveness of the proposal in terms of good quality of the stego-images, accurate recovery of the secret, and reduce the ER. Note that, despite the extensive research of SIS presented until now, only a few previous work is found on steganalysis in SIS. Not only constructing P-SIS scheme, but we also experimented the tolerance of the proposed P-SIS scheme against stganalysis in this paper. As a result, it is shown that the proposed scheme can withstand steganalysis based on machine learning (i.e., based on subtractive pixel adjacency matrix, SPAM).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Alvarez G, Hernandez L, Martin A (2003) Sharing secret color images using cellular automata with memory. Inf Sci 806:17

    Google Scholar 

  2. Ateniese G, Blundo C, Santis AD, Stinson DR (2001) Extended capabilities for visual cryptography. Theor Comput Sci 250(1–2):143–161

    Article  MathSciNet  MATH  Google Scholar 

  3. Bas TFP (2016) Bows-2. http://bows2.gipssa-lab.inpg.fr/. Accessed 7 April (2016)

  4. Blakley G (1979) Safeguarding cryptographic keys. In: AFIPS. IEEE Computer Society, pp 313–317

  5. Blakley GR, Meadows C (1985) Security of ramp schemes. In: Advances in cryptology, vol 53. Springer, Berlin, pp 242–268

  6. Chang C-C, Hsieh Y-P, Lin C-H (2008) Sharing secrets in stego images with authentication. Pattern Recog 41(10):3130–3137

    Article  MATH  Google Scholar 

  7. Droste S (1996) New results on visual cryptography. Adv Cryptol CRYPTO’96 1109:401–415

    MathSciNet  MATH  Google Scholar 

  8. Eslami Z, Zarepour Ahmadabadi J (2010) A verifiable multi-secret sharing scheme based on cellular automata. Inf Sci 180(15):2889–2894

    Article  MathSciNet  MATH  Google Scholar 

  9. Eslami Z, Razzaghi S, Ahmadabadi JZ (2010) Secret image sharing based on cellular automata and steganography. Pattern Recog 43(1):397–404

    Article  MATH  Google Scholar 

  10. Espejel-Trujillo A, Castillo-Camacho I, Nakano-Miyatake M, Gallegos-Garcia G, Perez-Meana H (2012) Improved secret image sharing scheme with payload optimization. In: 2012 IEEE 55th international midwest symposium on circuits and systems (MWSCAS), pp 1132–1135

  11. Gonzalez E (2016) Woods. Imageprocessingplace.com. http://www.imageprocessingplace.com/. Accessed 7 April (2016)

  12. Guo C, Chang C-C, Qin C (2012) A hierarchical threshold secret image sharing. Pattern Recog Lett 33(1):83–91

    Article  Google Scholar 

  13. Herzberg A, Jarecki S, Krawczyk H, Yung M (1995) Proactive secret sharing or: how to cope with perpetual leakage. Springer, Berlin, pp 339–352

    MATH  Google Scholar 

  14. Ker AD (2005) Improved detection of lsb steganography in grayscale images. In: Fridrich J (ed) Information hiding: 6th international workshop, IH 2004, Toronto, Canada, May 23-25, 2004, revised selected papers. Springer, Berlin, pp 97–115

  15. Lin P-Y, Chan C-S (2010) Invertible secret image sharing with steganography. Pattern Recog Lett 31(13):1887–1893

    Article  Google Scholar 

  16. Naor M, Shamir A (1995) Visual cryptography. Adv Cryptol EUROCRYPT’94 950:1–12

    MathSciNet  MATH  Google Scholar 

  17. Pevny T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forens Secur 5(2):215–224

    Article  Google Scholar 

  18. Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613

    Article  MathSciNet  MATH  Google Scholar 

  19. Thien C-C, Lin J-C (2002) Secret image sharing. Comput Graph 26(5):765–770

    Article  Google Scholar 

  20. Tong HHY, Venetsanopoulos AN (1998) A perceptual model for jpeg applications based on block classification, texture masking, and luminance masking. In: 1998 International conference on image processing, 1998. ICIP 98. Proceedings, vol 3, pp 428–432

  21. Wu X, Ou D, Liang Q, Sun W (2012) A user-friendly secret image sharing scheme with reversible steganography based on cellular automata. J Syst Softw 85(8):1852–1863

    Article  Google Scholar 

  22. Yamamoto H (1985) On secret sharing system using (k, L, n) threshold scheme. IECE Trans J68–A(9):945–952. (in Japanese). English translation: Electronics and Communications in Japan, Part I, vol. 69, no. 9, pp. 46–54, Scripta Technica Inc. 1986

    Google Scholar 

  23. Yang C-N, Chen T-S, Yu KH, Wang C-C (2007) Improvements of image sharing with steganography and authentication. J Syst Softw 80(7):1070–1076

    Article  Google Scholar 

  24. Zarepour-Ahmadabadi J, Ahmadabadi MS, Latif A (2016) An adaptive secret image sharing with a new bitwise steganographic property. Inf Sci 369:467–480

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgements

This work was partially supported by JSPS KAKENHI Grant Number JP26420345 and CONACYT (Consejo Nacional de Ciencia y Tecnología / National Council for Science and Technology).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Angelina Espejel-Trujillo.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Espejel-Trujillo, A., Iwamoto, M. & Nakano-Miyatake, M. A proactive secret image sharing scheme with resistance to machine learning based steganalysis. Multimed Tools Appl 77, 15161–15179 (2018). https://doi.org/10.1007/s11042-017-5097-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-5097-8

Keywords

Navigation