Abstract
In secret image sharing (SIS) schemes, a secret image is shared among a set of n images called stego-images. Each stego-image is preserved by a participant. In the recovery stage, at least k out of n stego-images are required to obtain the secret image, while k − 1 cannot reveal the secret in the sense of perfect secrecy. Hence, SIS guarantees long-term security. However, as the longer the stego-images remain stored, the higher is the probability of being vulnerable against steganalysis. To resolve this issue, this paper proposes the use of proactive secret sharing in an SIS scheme (P-SIS). P-SIS allows the stego-images to be renewed frequently while these are stored, without changing both cover and secret images. However, direct implementation of a proactive SIS requires more embedding rate (ER), causing high steganalysis accuracy detection and loss of quality in the stego-images. Our proposal addresses this issue and presents the combination of a (k, L, n)-threshold ramp secret sharing scheme and least significant bit matching (LSBM) steganography to reduce the steganalysis accuracy detection. The results of the evaluation show effectiveness of the proposal in terms of good quality of the stego-images, accurate recovery of the secret, and reduce the ER. Note that, despite the extensive research of SIS presented until now, only a few previous work is found on steganalysis in SIS. Not only constructing P-SIS scheme, but we also experimented the tolerance of the proposed P-SIS scheme against stganalysis in this paper. As a result, it is shown that the proposed scheme can withstand steganalysis based on machine learning (i.e., based on subtractive pixel adjacency matrix, SPAM).
Similar content being viewed by others
References
Alvarez G, Hernandez L, Martin A (2003) Sharing secret color images using cellular automata with memory. Inf Sci 806:17
Ateniese G, Blundo C, Santis AD, Stinson DR (2001) Extended capabilities for visual cryptography. Theor Comput Sci 250(1–2):143–161
Bas TFP (2016) Bows-2. http://bows2.gipssa-lab.inpg.fr/. Accessed 7 April (2016)
Blakley G (1979) Safeguarding cryptographic keys. In: AFIPS. IEEE Computer Society, pp 313–317
Blakley GR, Meadows C (1985) Security of ramp schemes. In: Advances in cryptology, vol 53. Springer, Berlin, pp 242–268
Chang C-C, Hsieh Y-P, Lin C-H (2008) Sharing secrets in stego images with authentication. Pattern Recog 41(10):3130–3137
Droste S (1996) New results on visual cryptography. Adv Cryptol CRYPTO’96 1109:401–415
Eslami Z, Zarepour Ahmadabadi J (2010) A verifiable multi-secret sharing scheme based on cellular automata. Inf Sci 180(15):2889–2894
Eslami Z, Razzaghi S, Ahmadabadi JZ (2010) Secret image sharing based on cellular automata and steganography. Pattern Recog 43(1):397–404
Espejel-Trujillo A, Castillo-Camacho I, Nakano-Miyatake M, Gallegos-Garcia G, Perez-Meana H (2012) Improved secret image sharing scheme with payload optimization. In: 2012 IEEE 55th international midwest symposium on circuits and systems (MWSCAS), pp 1132–1135
Gonzalez E (2016) Woods. Imageprocessingplace.com. http://www.imageprocessingplace.com/. Accessed 7 April (2016)
Guo C, Chang C-C, Qin C (2012) A hierarchical threshold secret image sharing. Pattern Recog Lett 33(1):83–91
Herzberg A, Jarecki S, Krawczyk H, Yung M (1995) Proactive secret sharing or: how to cope with perpetual leakage. Springer, Berlin, pp 339–352
Ker AD (2005) Improved detection of lsb steganography in grayscale images. In: Fridrich J (ed) Information hiding: 6th international workshop, IH 2004, Toronto, Canada, May 23-25, 2004, revised selected papers. Springer, Berlin, pp 97–115
Lin P-Y, Chan C-S (2010) Invertible secret image sharing with steganography. Pattern Recog Lett 31(13):1887–1893
Naor M, Shamir A (1995) Visual cryptography. Adv Cryptol EUROCRYPT’94 950:1–12
Pevny T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forens Secur 5(2):215–224
Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613
Thien C-C, Lin J-C (2002) Secret image sharing. Comput Graph 26(5):765–770
Tong HHY, Venetsanopoulos AN (1998) A perceptual model for jpeg applications based on block classification, texture masking, and luminance masking. In: 1998 International conference on image processing, 1998. ICIP 98. Proceedings, vol 3, pp 428–432
Wu X, Ou D, Liang Q, Sun W (2012) A user-friendly secret image sharing scheme with reversible steganography based on cellular automata. J Syst Softw 85(8):1852–1863
Yamamoto H (1985) On secret sharing system using (k, L, n) threshold scheme. IECE Trans J68–A(9):945–952. (in Japanese). English translation: Electronics and Communications in Japan, Part I, vol. 69, no. 9, pp. 46–54, Scripta Technica Inc. 1986
Yang C-N, Chen T-S, Yu KH, Wang C-C (2007) Improvements of image sharing with steganography and authentication. J Syst Softw 80(7):1070–1076
Zarepour-Ahmadabadi J, Ahmadabadi MS, Latif A (2016) An adaptive secret image sharing with a new bitwise steganographic property. Inf Sci 369:467–480
Acknowledgements
This work was partially supported by JSPS KAKENHI Grant Number JP26420345 and CONACYT (Consejo Nacional de Ciencia y Tecnología / National Council for Science and Technology).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Espejel-Trujillo, A., Iwamoto, M. & Nakano-Miyatake, M. A proactive secret image sharing scheme with resistance to machine learning based steganalysis. Multimed Tools Appl 77, 15161–15179 (2018). https://doi.org/10.1007/s11042-017-5097-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-017-5097-8