Next Article in Journal
Deep Sensing: Inertial and Ambient Sensing for Activity Context Recognition Using Deep Convolutional Neural Networks
Next Article in Special Issue
Hierarchical Anomaly Detection Model for In-Vehicle Networks Using Machine Learning Algorithms
Previous Article in Journal
InSAR Signal and Data Processing
Previous Article in Special Issue
Compression-Assisted Adaptive ECC and RAID Scattering for NAND Flash Storage Devices
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Maze Matrix-Based Secret Image Sharing Scheme with Cheater Detection

1
Department of Electronic Engineering, Tsinghua University, Beijing 100084, China
2
Department of Electronic Engineering, National Quemoy University, Kinmen 89250, Taiwan
3
Department of Information Engineering and Computer Science, Feng Chia University, Taichung 40724, Taiwan
4
School of Computer Science and Technology, Hangzhou Dianzi University, Hangzhou 310018, China
*
Author to whom correspondence should be addressed.
Sensors 2020, 20(13), 3802; https://doi.org/10.3390/s20133802
Submission received: 19 May 2020 / Revised: 29 June 2020 / Accepted: 6 July 2020 / Published: 7 July 2020

Abstract

:
Secret image sharing is a technique for sharing a secret message in such a fashion that stego image shadows are generated and distributed to individual participants. Without the complete set of shadows shared among all participants, the secret could not be deciphered. This technique may serve as a crucial means for protecting private data in massive Internet of things applications. This can be realized by distributing the stego image shadows to different devices on the Internet so that only the ones who are authorized to access these devices can extract the secret message. In this paper, we proposed a secret image sharing scheme based on a novel maze matrix. A pair of image shadows were produced by hiding secret data into two distinct cover images under the guidance of the maze matrix. A two-layered cheat detection mechanism was devised based on the special characteristics of the proposed maze matrix. In addition to the conventional joint cheating detection, the proposed scheme was able to identify the tampered shadow presented by a cheater without the information from other shadows. Furthermore, in order to improve time efficiency, we derived a pair of Lagrange polynomials to compute the exact pixel values of the shadow images instead of resorting to time-consuming and computationally expensive conventional searching strategies. Experimental results demonstrated the effectiveness and efficiency of the proposed secret sharing scheme and cheat detection mechanism.

Graphical Abstract

1. Introduction

Massive Internet of things (Massive IoT) involves an immense number of devices that require to be connected reliably and gigantic loads of data that need to travel safely through the Internet. With the growing public concerns over Internet privacy and security, there is an urgent appeal for research into secure communications in massive IoT. Pioneering works include the aggregate-signcryption [1], decentralized blockchain [2], FORGE system [3], and chaotic maps [4]. In this paper, we address this issue with a novel approach based on secret image sharing.
We propose to conceal the private data into a pair of image shadows and transmit them to separate devices over public networks. An authorized recipient should be able to access the image shadows stored on the separate devices and retrieve the private data via low-cost computations. The core component of the proposed secret image sharing scheme is the maze matrix, which belongs to a group of reference matrices originating from steganographic methods.
Steganography is the art and science of hiding information. It can be used to protect secret information by concealing it into cover images. These techniques can be broadly categorized into the transformed domain [5,6,7,8,9] and the spatial domain [10,11,12,13,14,15,16,17] methodologies. For the former class of methods, some commonly used transformations are the discrete cosine transform (DCT) [5,6], vector quantization (VQ) [7], and absolute moment block truncation coding (AMBTC) [8,9]. As for the latter class of methods, reference matrix-based algorithms have proved to be efficient in terms of the distortion versus capacity tradeoff. Common magic matrix-based steganographic schemes include the exploiting modified direction (EMD) [10,11], the turtle shell [12], the octagon-shaped shell [13], and the Sudoku [14,15,16,17] schemes.
Another closely related research stream is visual cryptography, which was first proposed by Naor and Shamir [18]. Typical visual cryptography schemes encrypt a secret image by breaking it up into n shares of obfuscated meaningless images, which are then printed onto separate transparencies. When k out of n transparencies are stacked and overlaid, the secret image will appear and become recognizable, where k is a pre-defined threshold. Methods of visual cryptography has constantly evolved, and the later developments contrived to produce shares in such a form that they themselves are images with meaningful contents [19,20,21,22].
A significant visual cryptography (SVC) [23] was recently proposed to securely transfer real-time images without compromising the visual quality. In the author’s scheme, random share values are hidden in a cover image by LSB embedding. The signific secret image with induced errors can be revealed using a (k, n) SVC scheme, while the exact secret image can be revealed using an (n, n) scheme. However, this scheme is not capable of detecting cheaters.
As a notable improvement, a verifiable secret sharing scheme with combiner verification and cheater identification [24] was recently developed. Its share generation and secret reconstruction mechanisms were based on the polynomial interpolation technique invented by Shamir [25]. Its combiner verification and cheater identification were realized via a pre-shared key and a verifier code generated from the combiner’s ID and password.
A recent development by Liu et al. [26] demonstrated that it is possible to identify the tampered shadows by restricting the use of elements at certain locations of the reference matrix and checking justness of the mapped elements in the secret extracting process. Through this mechanism, dishonest behaviors can be detected without the help of a pre-shared secret key or a password system.
In this paper, we proposed a novel secret image sharing scheme for massive IoT applications. The image shadows were generated under the guidance of the maze matrix. By leveraging the special characteristics of the maze matrix, we were able to inspect whether cheating behaviors took place. A two-layered cheat detection mechanism was devised. A joint cheat detection can discover cheating behaviors and a blind cheater identification can trace which shadow is inauthentic.
The proposed scheme shares the same merits as Liu et al.’s scheme, as that no pre-shared secret key or password system is required. In addition to this, the proposed maze matrix was explicitly designed to enable the scheme to detect cheats under the paradigm of secret sharing. Moreover, we formulated a pair of Lagrange polynomials to compute the exact pixel values of the shadow images rather than adopting time-consuming and computationally expensive conventional searching strategies. As a consequence, the time efficiency of the proposed share construction algorithm can be dramatically improved.
This remainder of this paper is organized as follows. Section 2 reviews a state-of-the-art secret image sharing scheme. Section 3 presents the proposed secret image sharing scheme based on maze matrix and the two-layered cheat detection mechanism. Experimental results and performance comparisons are shown in Section 4. This paper is concluded in Section 5.

2. Related Work

In this section, we briefly review the secret image sharing scheme proposed by Liu et al. [26] with a discussion of its merits and demerits. Our proposed scheme was based on the similar framework and is introduced in the next section.
The secret image sharing scheme proposed by Liu et al. [26] allows a dealer to share secret message into two different meaningful images. It adopts the turtle shell matrix M ( p 1 i , p 2 i ) , proposed by Chang et al. [12], to guide the embedding of secret message, as shown in Figure 1. Before constructing secret shares of shadow images, the binary stream of secret message is converted to 8-ary secret set S = { s g k | k = 1 , 2 , , n } . The pixels of two distinct grayscale cover images with size H × W are rearranged into C 1 = { p 1 i | i = 1 , 2 , , H × W } and C 2 = { p 2 i | i = 1 , 2 , , H × W } . Each pair of pixels ( p 1 i , p 2 i ) is used to embed a secret digit s g k in a way like conventional reference matrix-based data hiding scheme.
For the purpose of cheating detection, the elements in the reference matrix are classified into back elements and edge elements. As implied by the name, an edge element is an element located on the common edges of adjacent hexagons. On the contrary, a back element is located inside a single hexagon. The embedding rules are as follows. The cover pixel pair ( p 1 i , p 2 i ) is applied to locate a reference element in the matrix first. For an edge reference element, the rocket-shaped turtle shells as shown in the figure are the candidates of embedding, while the flower-shaped turtle shells are the candidates for a back-reference element. By searching the candidates to find the nearest back element that M ( p 1 i , p 2 i ) = s g k , the obtained pixels ( p 1 i , p 2 i ) are recorded to the image shadows. After all secret digits are embedded, the shadow images S 1 = { p 1 i | i = 1 , 2 , , H × W } and S 2 = { p 2 i | i = 1 , 2 , , H × W } are constructed. By restricting the embedding candidates to the back elements only, the cheating event can be detected while the shadow pixel pair ( p 1 i , p 2 i ) is mapped to an edge element M ( p 1 i , p 2 i ) .
Two typical examples of data hiding are illustrated in Figure 1. In the first example, the cover pixel pair is ( p 1 i , p 2 i ) = ( 2 , 4 ) and the secret digit is s g k = 7 . First, the cover pixel pair ( 2 , 4 ) is mapped to the edge reference element M ( 2 , 4 ) . By searching its associated rocket-shaped candidate turtle shells, the only matched back element is M ( 2 , 2 ) = 7 = s g k . The recorded shadow pixels are therefore ( p 1 i , p 2 i ) = ( 2 , 2 ) . Although M ( 3 , 5 ) and M ( 0 , 3 ) are also matched with the secret digit, they are not back elements and thus conflict with the embedding rule.
The second example uses ( p 1 i , p 2 i ) = ( 10 , 5 ) and s g k = 5 as inputs. The reference element M ( 10 , 5 ) is a back element, therefore the candidates of embedding are the flower-shaped turtle shells shown in the figure. The matched candidates M ( 9 , 5 ) and M ( 12 , 7 ) are edge elements and excluded. Two legal candidates are M ( 11 , 4 ) and M ( 9 , 8 ) . The nearest matched back element M ( 11 , 4 ) is the final solution and the shadow pixels are given by ( p 1 i , p 2 i ) = ( 11 , 4 ) .
To extract secret data, both shares of the image shadows should be obtained from the participants. The corresponding pair of pixels from the two shadows is mapped to the secret digit through the guidance of the turtle shell matrix. In case an edge element is mapped, we can conclude someone is cheating. The exact cheater can only be identified by a faithful participant. To overcome this weak point, we propose a new scheme in the following section.

3. The Proposed Secret Image Sharing Scheme

The proposed secret image sharing scheme was to convert two distinct cover images into a pair of shadow images through the guidance of a new proposed maze matrix. By cooperating the pair of shadow images occupied by two different participants, the embedded secret data could be extracted. In addition, a cheater detection mechanism was devised such that any cheating share of shadow images could be detected without help of the other share.

3.1. The Maze Matrix

The maze matrix was constructed using a basic structure matrix of size 6 × 6 as enclosed by the red square shown in Figure 2. Distinct numbers in the radix-16 number system were arranged by circulating the outmost boundary of the region except for a horizontal and a vertical gap. Other elements were marked with ‘x’. By repeated mirroring operations, the rest of a 256 × 256 maze matrix was constructed. The first mirror matrix of the red basic structure to the p α direction of axis was enclosed by a blue square in the figure. The resulting matrix M ( p α , p β ) looks like a big maze map and was named the maze matrix.

3.2. The Data Embedding and Extraction Scheme

Following the same problem formulation as the turtle shells matrix-based secret image sharing scheme [26], we constructed a pair of image shadows using a pair of distinct cover images through the guidance of the proposed maze matrix.
Before constructing secret shares of shadow images, the binary stream of secret message was converted to 16-ary secret set S = { s g k | k = 1 , 2 , , n } . Pixels of two distinct grayscale cover images with size H × W are rearranged into C 1 = { p 1 i | i = 1 , 2 , , H × W } and C 2 = { p 2 i | i = 1 , 2 , , H × W } .
Each pair of pixels ( p 1 i , p 2 i ) was used to embed a secret digit s g k through the guidance of the maze matrix. For a cover pixel pair ( p 1 i , p 2 i ) , it was mapped to the maze matrix M ( p 1 i , p 2 i ) first. Then, we searched the neighboring elements to find the nearest matched element M ( p 1 i , p 2 i ) = s g k and record the shadow pixels ( p 1 i , p 2 i ) to the shadow images. After all secret digits were embedded, the shadow images S 1 = { p 1 i | i = 1 , 2 , , H × W } and S 2 = { p 2 i | i = 1 , 2 , , H × W } were constructed. Note that the elements marked with ‘x’ can never be the target element. This property will be applied to devise the cheating detection mechanism.
The data extraction process is rather simple: Collect the pair of image shadows provided by different participants and construct the same maze matrix as embedding. Then, consecutively extract secret digits by s g k = M ( p 1 i , p 2 i ) until all secrets are extracted.
To detect cheating events, the ‘x’-marked forbidden zone is the key. Any pair of shadow pixels which maps to an ‘x’-marked element indicates someone is cheating. In addition, while the mapped element lies at a horizontal or vertical gap of the maze matrix, the exact cheater can be identified.
The detailed algorithms of the data embedding and extraction processes are discussed in the following subsections. In the last subsection, we discuss the cheater detection mechanism of the proposed secret image sharing scheme.

3.3. The Sshare Construction Algorithm

As described in the previous subsection, a secret digit is embedded by modifying the cover pixel pair to the target element through the guidance of maze matrix. However, the searching process is time-consuming. To improve the embedding efficiency, we devised a Lagrange polynomial to determine the target element of modification. Let ( p x , p y ) be the cover pixel pair in the range 0 p x 4 ,   0 p y 4 . According to the maze matrix as shown in Figure 2, the target elements of modification for embedding different secret digits are listed in Table 1.
Let
X = { x 0 , x 1 , x 2 , , x 15 } = { 0 , 0 , 0 , 0 , 0 , 1 , 2 , 3 , 5 , 5 , 5 , 5 , 5 , 3 , 2 , 1 } ,
Y = { y 0 , y 1 , y 2 , , y 15 } = { 0 , 2 , 3 , 4 , 5 , 5 , 5 , 5 , 5 , 4 , 3 , 2 , 0 , 0 , 0 , 0 } .
The modified pixel pair ( p x , p y ) can be represented by the Lagrange polynomial functions of s j as shown below:
p x ( s g j ) = r = 0 15 x r k r k = 0 15 ( s g j k ) ( r k ) ,
p y ( s g j ) = r = 0 15 y r k r k = 0 15 ( s g j k ) ( r k ) .
By leveraging the periodic property of the maze matrix, we modulated a reference element M ( p α , p β ) to the fundamental period of M ( p x , p y ) , 0 p x 9 ,   0 p y 9 . Then, the fundamental period was further divided into four reflective symmetric parts. According to the secret digit s j to be embedded, a quasi-target element M ( p x ( s g j ) , p y ( s g j ) ) can be obtained. By reflection and backward modulation, the target element M ( p α , p β ) can be determined. The detailed algorithm is summarized as follows.
The construction of image shadows:
Input: Cover images C 1 and C 2 , secret message S
Output: Image shadows S 1 and S 2
Step 1. Arrange the cover images into two separate pixel streams and convert the secret message to 16-ary secret digits.
C 1 = { p 1 i | i = 1 , 2 , , H × W } ,
C 2 = { p 2 i | i = 1 , 2 , , H × W } ,
where H × W is the image size.
S = { s g k | k = 1 , 2 , , n } ,
where n is the total number of digits.
Step 2. Retrieve a cover pixel pair ( p 1 i , p 2 i ) and let
( p α , p β ) = { ( p 1 i , p 2 i ) , for   i   is   odd , ( p 2 i , p 1 i ) , for   i   is   even .
Step 3. Modulate the pixel values to the fundamental period.
p x = m o d ( p α ,   10 ) ,
p y = m o d ( p β ,   10 ) .
M = p α 10 ,
N = p β 10 .
Step 4. Using the Lagrange polynomial defined as Equations (1) to (4), determine the target element of modification.
For 0 p x 4   and   0 p y 4 ,
p α = p x ( s g j ) + 10 × M ;
p β = p y ( s g j ) + 10 × N .
For 5 p x 9   and   0 p y 4 ,
p α = [ 10 p x ( s g j ) ] + 10 × M ;
p β = p y ( s g j ) + 10 × N .
For 0 p x 4   and   5 p y 9 ,
p α = p x ( s g j ) + 10 × M ;
p β = [ 10 p y ( s g j ) ] + 10 × N .
For 5 p x 9   and   5 p y 9 ,
p α = [ 10 p x ( s g j ) ] + 10 × M ;
p β = [ 10 p y ( s g j ) ] + 10 × N .
Step 5. Record the shadow pixels.
( p 1 i , p 2 i ) = { ( p α , p β ) , for   i   is   odd , ( p β , p α ) , for   i   is   even .
Step 6. Repeat Step 2 to 5 until all secret digits are embedded.
Step 7. Output the pair of image shadows.
S 1 = { p 1 i | i = 1 , 2 , , H × W } ;
S 2 = { p 2 i | i = 1 , 2 , , H × W } .
Note that there are many gaps at mod ( p α , 10 ) = 4 , 6 and mod ( p β , 10 ) = 1 , 9 of the maze matrix. Using the conventional fixed assignment of ( p α , p β ) = ( p 1 i , p 2 i ) , the resulting ( p α , p β ) will lack the gapped pixel values. This may draw the eavesdropper’s attention. To prevent the vacuums of pixel value, we alternatively assigned ( p α , p β ) with ( p 1 i , p 2 i ) and ( p 2 i , p 1 i ) in Step 2 and switched back in Step 5 coordinately. The asymmetric gapping of maze matrix in the p α and p β directions made it possible to cover the gaps by leveraging the alternating assignment.
We provide two examples to demonstrate the operation of embedding process. Assume the first cover pixel pair is ( p 11 , p 21 ) = ( 83 , 61 ) and the secret digit to be embedded is s g 1 = 5 . Following the steps of embedding algorithm gives ( p α , p β ) = ( 83 , 61 ) , ( p x , p y ) = ( 3 , 1 ) , ( M , N ) = ( 8 , 6 ) , ( p x ( 5 ) , p y ( 5 ) ) = ( 1 , 5 ) , and ( p 11 , p 21 ) = ( p α , p β ) = ( 1 + 8 × 10 , 5 + 6 × 10 ) = ( 81 , 65 ) . Let the second cover pixel pair and the second secret digit be ( p 12 , p 22 ) = ( 83 , 66 ) and s g 2 = 14 . Following the same calculation gives ( p α , p β ) = ( p 22 , p 12 ) = ( 66 , 83 ) , ( p x , p y ) = ( 6 , 3 ) , ( M , N ) = ( 6 , 8 ) , ( p x ( 14 ) , p y ( 14 ) ) = ( 2 , 0 ) , and ( p α , p β ) = ( ( 10 2 ) + 6 × 10 , 0 + 8 × 10 ) = ( 68 , 80 ) , and ( p 12 , p 22 ) = ( p β , p α ) = ( 80 , 68 ) .

3.4. The Data Extraction Algorithm

The secret message can be extracted only through cooperation of the two shadow image owners. The secret data can be extracted by pairing the pixels from the two image shadows and applying each pixel pair to retrieve a 16-ary secret digit through the guidance of maze matrix. The 16-ary secret digits can be converted back to the binary secret stream if necessary. The data extraction algorithm is provided as follows.
The data extraction algorithm:
Input: image shadows S 1 and S 2
Output: secret message S
Step 1. Arrange the image shadows into two separate pixel streams.
S 1 = { p 1 i | i = 1 , 2 , , H × W } ;
S 2 = { p 2 i | i = 1 , 2 , , H × W } ,
where H × W is the image size.
Step 2. Construct the fundamental period of maze matrix M ( p x , p y ) , 0 p x 9 ,   0 p y 9 as shown in Figure 2.
Step 3. Retrieve a shadow pixel pair ( p 1 i , p 2 i ) and let
( p α , p β ) = { ( p 1 i , p 2 i ) , for   i   is   odd , ( p 2 i , p 1 i ) , for   i   is   even .
Step 4. Extract the secret digit s g j and record to S .
s g j = M ( m o d ( p α ,   10 ) , m o d ( p β ,   10 ) ) .
Step 5. Repeat Step 3 and 4 until all secret digits are extracted.
Step 6. Convert the 16-ary secret digits back to the binary secret stream.
Now, we apply the embedding results in the previous subsection ( p 11 , p 21 ) = ( 81 , 65 ) and ( p 12 , p 22 ) = ( 80 , 68 ) as examples. For the first shadow pixel pair, the secret digit can be retrieved by directly calculating Equation (27), i.e., s g 1 = M ( m o d ( 81 ,   10 ) ,   m o d ( 65 ,   10 ) ) = M ( 1 , 5 ) = 5 . For the second pixel pair, the pixels should be swapped according to Equation (26), i.e., ( p α , p β ) = ( 68 , 80 ) . Then, calculate Equation (27),, i.e., s g 2 = M ( m o d ( 68 ,   10 ) ,   m o d ( 80 ,   10 ) ) = M ( 8 , 0 ) = 14 . Both secret digits coincided with the embedded ones.

3.5. The Cheat Event Detection and Cheater Detection Mechanism

The most creative part of our secret sharing scheme was the cheater detection mechanism. Referring to Figure 2, the ‘x’-marked elements in the maze matrix were the traps. Any pair of shadow pixels which maps to an ‘x’-marked element was illegal and served as key information for cheat event detection. The algorithm is given as follows.
The cheat detection algorithm:
Input: image shadows S 1 and S 2
Output: cheating pixel pairs F , cheating pixels F 1 and F 2
Step 1. Arrange the image shadows into two separate pixel streams.
S 1 = { p 1 i | i = 1 , 2 , , H × W } ;
S 2 = { p 2 i | i = 1 , 2 , , H × W } ,
where H × W is the image size.
Step 2. Construct the fundamental period of maze matrix M ( p x , p y ) , 0 p x 9 ,   0 p y 9 as shown in Figure 2.
Step 3. Retrieve a shadow pixel pair ( p 1 i , p 2 i ) and let
( p α , p β ) = { ( p 1 i , p 2 i ) , for   i   is   odd , ( p 2 i , p 1 i ) , for   i   is   even .
Step 4. Detect cheating pixel pairs and individual cheating pixels.
if M ( m o d ( p α ,   10 ) , m o d ( p β ,   10 ) ) = x ,
  record i to F ;
  if m o d ( p α ,   10 ) = 4   or   6 ,
    record i to F 1 for i   is   odd ; record i to F 2 for i   is   even .
  end
  if m o d ( p β ,   10 ) = 1   or   9 ,
    record i to F 2 for i   is   odd ; record i to F 1 for i   is   even .
  end
end
Step 5. Repeat Step 3 and 4, until all pixel pairs are checked.
The cheat detection included two layers. The outer layer was a joint cheat event detection. The shadow pixel pair was mapped to the maze matrix and check the legality. If an ‘x’-marked element was mapped, the index i of the pixel pair was recorded to F . Under such circumstances, we could conclude that a cheat event was detected. The exact cheater could only be determined by a faithful participant. The inner layer was a blind cheater detection. We checked whether the mapped element was located at a gap. If it was located at a horizontal gap, p α was a tampered pixel no matter what value p β is, because it was impossible to find a p β to make the pixel pair ( p α , p β ) legal. For the same reason, a p β trapped in a vertical gap was a tampered pixel, and the participant who shared this shadow pixel was the cheater. The output sets F 1 and F 2 recorded the indices of tampered pixels from image shadows S 1 and S 2 , respectively.

4. Experimental Results

In this section, we give some experimental results to show the performance of the proposed secret image sharing scheme. Figure 3 shows six pairs of 512 × 512 grayscale cover images, including (a) Lena and baboon, (b) Tiffany and Barbara, (c) airplane and peppers, (d) boat and Goldhill, (e) toys and girl, and (f) Elaine and sailboat. According to the embedding capacity of the proposed scheme, we used a 362 × 362 grayscale secret image “office,” as shown in Figure 4. The embedding capacity of a cover image pair was 512 × 512 × 4 = 1 , 048 , 576 bits, while the secret image contained 362 × 362 × 8 = 1 , 048 , 352 bits of data. The whole secret image can be embedded into a cover image pair. The remaining capacity was filled with random generated data.
This section includes four subsections. In the first subsection, we demonstrate the applicability of the proposed share construction and data extraction scheme. The visual quality of the secret image shadows is also assessed. In the second subsection, we measure the detection ratio of tampered image regions. The effectiveness of cheat event detection and cheater detection are discussed. In the third subsection, the performance, including visual quality, hiding capacity, and cheat detection effectiveness, is compared with the Liu et al.’s scheme, which shares the same framework of secret image sharing scheme. Finally, the time efficiency of the new proposed share construction scheme is compared with conventional version in the last subsection.

4.1. Share Construction and Data Extraction

To demonstrate the applicability of the proposed secret image sharing scheme, all six pairs of cover images were tested. Two examples of the experimental results are shown in Figure 5 and Figure 6, where (a) and (b) are the cover images, (c) and (d) are the shadow images, and (e) is the recovered secret image. As shown in the figures, the difference between a cover image and its corresponding shadow image cannot be distinguished by human eyes.
To evaluate the visual quality of the shadow images, we applied the peak-signal-to-noise ratio (PSNR), defined by
P S N R = 10 log 10 255 2 M S E ( dB ) ,
where MSE is the mean square error between the cover image C k and its corresponding shadow image S k , defined by
M S E = 1 H × W i = 1 H j = 1 W ( C k ( i , j ) S k ( i , j ) ) 2 .
The visual quality and embedding capacity for the six cover image pairs are listed in Table 2.

4.2. Cheat Event Detection and Cheater Detection

The six pairs of image shadows were then applied to test the cheating detection mechanism. In each pair of shadows, shadow 1 was tampered by inserting a small image into a local region while shadow 2 was kept faithful. Four results of the six experiments are provided in Figure 7, Figure 8, Figure 9 and Figure 10, where (a) is the tampered shadow image 1, (b) is the faithful shadow image 2, and (c) is the result of joint detection. The detected cheat pixel pairs are illustrated by black pixels on the tampered shadow. The joint cheat detection ratio for the six test shadow pairs are listed in Table 3. In each test pair, the detection ratio was calculated by
D R J = N ( F ) N ,
where N ( F ) is the number of total detected cheat pixel pairs and N is the number of tampered pixels, i.e., the total number of pixels in the inserted small image. As shown in the table, D R J of the joint cheat detection was around 0.42 and independent of the image features.
The blind cheater detection results for the six tampered shadows are listed in Table 4. The detection ratio for blind cheater detection is defined by
D R B 1 = N ( F 1 ) N ,
where N ( F 1 ) is the number of total detected pixel in shadow 1 by blind cheater detection and N is the number of tampered pixels, i.e., the total number of pixels in the inserted small image. As shown in the table, D R B of the blind cheater detection is around 0.20 and independent of the image features. Since the image shadow 2 was not tampered, the number of detected pixels N ( F 2 ) and thus D R B 2 are both zeros.
To investigate the effect of combinatorial tampering, we further designed an experiment in which both image shadows were tampered with dis-aligned regions. Example results are given in Figure 11 and Figure 12, where (a) and (b) are the cover image pair, (c) and (d) are the detection results of joint cheat detection, and (e) illustrates the overview of total detected pixels. The experimental data for all six test shadow image pairs are listed in Table 5, where D R 1 / D R 2 is the joint cheating detection ratio ( D R J ) of the region that shadow 1/shadow 2 is tampered only; D R 1 2 is the D R J of the region that both shadow1 and shadow 2 are tampered; D R 1 2 is the D R J of the union tampered region. The joint cheating detection ratio ( D R 1 / D R 2 ) was around 43% for single tampered pixel pairs, while it was increased to 72% for combinatorial tampered pixel pairs ( D R 1 2 ). Both of the percentage numbers were independent of the image features since the proposed data hiding scheme was a uniform embedding scheme [27]. The detection ratio of the union region ( D R 1 2 ) depended on the percentage of overlapped region and was not an intrinsic characteristic of the proposed scheme.

4.3. Comparison with Liu et al.’s Scheme [26]

The comparison of the proposed maze matrix-based data hiding scheme with the turtle shell matrix-based scheme [26] is provided in Table 6. The new proposed scheme can hide four bits of secret data for each pair of cover pixels, while the turtle shell matrix-based scheme can hide only three bits for each pair. The EC given in the table was measured by bits per pixel pair, one from cover image 1 and the other from cover image 2. Due to different embedding capacity, the PSNR of the proposed scheme was slightly lower than the turtle shell scheme. However, the degradation of visual quality could not be recognized by human eyes.
The joint cheat detection ratio of the turtle shell scheme was 50% in both single tampered or combinatorial tampered cases. Although only the single tampered data was provided by the authors, the combinatorial tampered detection ratio can be analyzed easily. Since legal hiding locations are the back elements of turtle shells and such elements occupy 50% of the entire matrix, the theoretic cheating detection ratio was 50%. Our cheating detection mechanism outperformed the turtle shell scheme in combinatorial tampering, while the detection ratio was lower in single tampering.
The most creative part of the proposed scheme is the function of blind cheater detection. Without information of the other shadow, we detected 20% of tampered pixels in the shadow shared by a cheater. Meanwhile, the turtle shell scheme can only identify a cheater by a faithful participant.

4.4. Time Efficiency Evaluation

To assess the time efficiency of the proposed secret image sharing scheme, we listed the execution time required for the share construction program in Table 7 and the execution time for secret data extraction program in Table 8. The conventional reference matrix-based data hiding scheme and share construction scheme usually embed secret data by searching the nearest element that matches the intended secret digit and modify the pixel values accordingly. This type of searching procedures is often time-consuming. In this paper, a pair of Lagrange polynomials was derived to compute the coordinates of the matched element. Thus, the running time for share construction was drastically reduced. Referring to Table 7, up to 39% of execution time can be saved by leveraging the proposed approach. The execution time required for data extraction grogram is relatively short in comparison with the share construction program as shown in Table 8.

5. Conclusions

In this paper, we proposed a secret image sharing scheme based on a novel maze matrix. A pair of distinct cover images was used to carry secret data and a pair of shadow images was constructed under the guidance of the maze matrix. The secret data is extracted only if both authentic shadows are presented.
A two-layered cheat detection mechanism was devised to examine cheating behaviors as well as to ascertain the inauthentic shadow. In the outer cheat detection layer, the corresponding pair of pixels retrieved from the two shares was jointly used for detecting cheat events. The detection ratio was 43% for the cases in which single shadow was tampered and was 72% for the cases in which both shadows were tampered. In the inner blind cheater identification layer, the cheater’s image share could be spotted without the information from the other share. The detection ratio of tampered pixels was 20% for the blind cheater identification.
An additional merit of the proposed scheme is time efficiency. By computing the pixel values of the image shadows with Lagrange polynomials instead of conventional searching algorithms, the proposed approach can save up to 39% of program execution time. In view of the effectiveness and low power consumption of the proposed scheme, the outlook for integrating it with massive IoT systems as a data security module shall be positive.
In the future world where massive IoT environment is fully established, secret image sharing will no longer be restricted to share secrets among human participants. The image shadows produced by the dealer can be transmitted via different routes to devices located at different sites. The shadow production and secret extraction will be executed via APPs installed on smartphones of the dealer and receiver. Uploading and downloading image shadows through IoT links will permit secret data to be communicated securely without the use of a preshared key or password system.

Author Contributions

Conceptualization, C.-C.C. (Ching-Chun Chang) and J.-H.H.; Data curation, C.-S.S.; Formal analysis, J.-H.H.; Funding acquisition, J.-H.H.; Investigation, C.-S.S.; Methodology, C.-C.C. (Ching-Chun Chang) and J.-H.H.; Project administration, C.-C.C. (Chin-Chen Chang); Resources, C.-S.S.; Software, C.-S.S.; Supervision, C.-C.C. (Chin-Chen Chang); Validation, J.-H.H.; Visualization, J.-H.H., C.-C.C. (Ching-Chun Chang) and C.-C.C. (Chin-Chen Chang); Writing: original draft, J.-H.H.; Writing: review & editing, J.-H.H., C.-C.C. (Ching-Chun Chang) and C.-C.C. (Chin-Chen Chang). All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no competing interests.

References

  1. Ullah, S.; Marcenaro, L.; Rinner, B. Secure smart cameras by aggregate-signcryption with decryption fairness for multi-receiver IoT applications. Sensors 2019, 19, 327. [Google Scholar] [CrossRef] [Green Version]
  2. Li, Y.; Tu, Y.; Lu, J.; Wang, Y. A security transmission and storage solution about sensing image for blockchain in the Internet of Things. Sensors 2020, 20, 916. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  3. Chakraborty, T.; Jajodia, S.; Katz, J.; Picariello, A.; Sperli, G.; Subrahmanian, V.S. FORGE: A fake online repository generation engine for cyber deception. IEEE Trans. Dependable Secure Comput. 2019. [Google Scholar] [CrossRef]
  4. García-Guerrero, E.E.; Inzunza-González, E.; López-Bonilla, O.R.; Cárdenas-Valdez, J.R.; Tlelo-Cuautle, E. Randomness improvement of chaotic maps for image encryption in a wireless communication scheme using PIC-microcontroller via Zigbee channels. Chaos Solitons Fractals 2020, 133, 109646. [Google Scholar] [CrossRef]
  5. Chang, C.; Lin, C.; Tseng, C.; Tai, W. Reversible hiding in DCT-based compressed images. Inf. Sci. 2007, 177, 2768–2786. [Google Scholar] [CrossRef]
  6. Huang, F.; Qu, X.; Kim, H.; Huang, J. Reversible data hiding in JPEG images. IEEE Trans. Circuits Syst. Video Technol. 2016, 26, 1610–1621. [Google Scholar] [CrossRef]
  7. Hu, Y. High capacity image hiding scheme based on vector quantization. Pattern Recogn. 2006, 39, 1715–1724. [Google Scholar] [CrossRef]
  8. Lin, Y.; Hsia, C.; Chen, B.; Chen, Y. Visual IoT security: Data hiding in AMBTC images using block-wise embedding strategy. Sensors 2019, 19, 1974. [Google Scholar] [CrossRef] [Green Version]
  9. Chang, C.; Wang, X.; Horng, J. A hybrid data hiding method for strict AMBTC format images with high-fidelity. Symmetry 2019, 11, 1314. [Google Scholar] [CrossRef] [Green Version]
  10. Zhang, X.; Wang, S. Efficient steganographic embedding by exploiting modification direction. IEEE Commun. Lett. 2006, 10, 781–783. [Google Scholar] [CrossRef]
  11. Kim, H.; Kim, C.; Choi, Y.; Wang, S.; Zhang, X. Improved modification direction schemes. Comput. Math. Appl. 2010, 60, 319–325. [Google Scholar] [CrossRef] [Green Version]
  12. Chang, C.C.; Liu, Y.; Nguyen, T.S. A novel turtle shell based scheme for data hiding. In Proceedings of the 2014 tenth international conference on intelligent information hiding and multimedia signal processing, New York, NY, USA, 27–29 August 2014; pp. 89–93. [Google Scholar]
  13. Leng, H. Generalized scheme based on octagon-shaped shell for data hiding in steganographic applications. Symmetry 2019, 11, 760. [Google Scholar] [CrossRef] [Green Version]
  14. Chang, C.; Chou, Y.; Kieu, T. An information hiding scheme using Sudoku. In Proceedings of the 2008 3rd international conference on innovative computing information and control, Dalian, China, 18 June 2008; pp. 17–22. [Google Scholar]
  15. Xia, B.; Wang, H.; Chang, C.; Liu, L. An image steganography scheme using 3D-Sudoku. J. Info. Hiding Multimed. Sign Proc. 2016, 7, 836–845. [Google Scholar]
  16. He, M.; Liu, Y.; Chang, C. A mini-Sudoku matrix-based data embedding scheme with high payload. IEEE Access 2019, 7, 141414–141425. [Google Scholar] [CrossRef]
  17. Horng, J.; Xu, S.; Chang, C.; Chang, C. An efficient data-hiding scheme based on multidimensional mini-SuDoKu. Sensors 2020, 20, 2739. [Google Scholar] [CrossRef]
  18. Naor, M.; Shamir, A. Visual cryptography. In Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, 9–12 May 1994; pp. 1–12. [Google Scholar]
  19. Nakajima, M.; Yamaguchi, Y. Extended visual cryptography for natural images. J. WSCG 2002, 10, 2. [Google Scholar]
  20. Kang, I.; Arce, G.; Lee, H. Color extended visual cryptography using error diffusion. IEEE Trans. Image Process. 2011, 20, 132–145. [Google Scholar] [CrossRef] [Green Version]
  21. Patil, S.; Rao, J. Extended visual cryptography for color shares using random number generators. IEEE Trans. Image Process. 2012, 1, 399–410. [Google Scholar]
  22. Jainthi, K.; Prabhu, P. A novel cryptographic technique that emphasis visual quality and efficiency by Floyd Steinberg error diffusion method. Int. J. Res. Eng. Technol. 2015, 4, 428–439. [Google Scholar]
  23. Mary, G.S.; Kumar, S.M. Secure grayscale image communication using significant visual cryptography scheme in real time applications. Multimed. Tools Appl. 2019, 79, 1–20. [Google Scholar]
  24. Kandar, S.; Dhara, B.C. A verifiable secret sharing scheme with combiner verification and cheater identification. J. Inf. Secur. Appl. 2020, 51, 102430. [Google Scholar] [CrossRef]
  25. Shamir, A. How to share a secret. Commun. ACM 1979, 22, 612–613. [Google Scholar] [CrossRef]
  26. Liu, Y.; Chang, C.C.; Huang, P.C. Security protection using two different image shadows with authentication. Math. Biosci. Eng. 2019, 16, 1914–1932. [Google Scholar] [CrossRef]
  27. Liao, X.; Qin, Z.; Ding, L. Data embedding in digital images using critical functions. Signal Process. Image Commun. 2017, 58, 146–156. [Google Scholar] [CrossRef]
Figure 1. The turtle shell matrix for secret image sharing scheme.
Figure 1. The turtle shell matrix for secret image sharing scheme.
Sensors 20 03802 g001
Figure 2. The maze matrix for secret image sharing scheme.
Figure 2. The maze matrix for secret image sharing scheme.
Sensors 20 03802 g002
Figure 3. Six pairs of grayscale cover images.
Figure 3. Six pairs of grayscale cover images.
Sensors 20 03802 g003
Figure 4. Secret image.
Figure 4. Secret image.
Sensors 20 03802 g004
Figure 5. Experimental results of cover image pair 1.
Figure 5. Experimental results of cover image pair 1.
Sensors 20 03802 g005
Figure 6. Experimental results of cover image pair 2.
Figure 6. Experimental results of cover image pair 2.
Sensors 20 03802 g006
Figure 7. Joint cheat detection result 1.
Figure 7. Joint cheat detection result 1.
Sensors 20 03802 g007
Figure 8. Joint cheat detection result 2.
Figure 8. Joint cheat detection result 2.
Sensors 20 03802 g008
Figure 9. Joint cheat detection result 3.
Figure 9. Joint cheat detection result 3.
Sensors 20 03802 g009
Figure 10. Joint cheat detection result 4.
Figure 10. Joint cheat detection result 4.
Sensors 20 03802 g010
Figure 11. Joint cheating detection for combinatorial tampered shadows: Results for shadow pair 1.
Figure 11. Joint cheating detection for combinatorial tampered shadows: Results for shadow pair 1.
Sensors 20 03802 g011
Figure 12. Joint cheating detection for combinatorial tampered shadows: Results for shadow pair 3.
Figure 12. Joint cheating detection for combinatorial tampered shadows: Results for shadow pair 3.
Sensors 20 03802 g012aSensors 20 03802 g012b
Table 1. Target elements of modification for different secret digits.
Table 1. Target elements of modification for different secret digits.
s g j ( p x , p y ) s g j ( p x , p y ) s g j ( p x , p y ) s g j ( p x , p y )
0 ( 0 ,   0 ) 4 ( 0 ,   5 ) 8 ( 5 , 5 ) 12 ( 5 ,   0 )
1 ( 0 ,   2 ) 5 ( 1 ,   5 ) 9 ( 5 ,   4 ) 13 ( 3 ,   0 )
2 ( 0 ,   3 ) 6 ( 2 ,   5 ) 10 ( 5 ,   3 ) 14 ( 2 ,   0 )
3 ( 0 ,   4 ) 7 ( 3 ,   5 ) 11 ( 5 ,   2 ) 15 ( 1 ,   0 )
Table 2. Experimental values of the proposed scheme.
Table 2. Experimental values of the proposed scheme.
Cover Image 1Cover Image 2PSNR (dB)Embedding Capacity (bits)
Shadow 1Shadow 2
Pair 1Lenababoon39.8839.891,048,576
Pair 2TiffanyBarbara39.8639.901,048,576
Pair 3airplanepeppers39.8739.881,048,576
Pair 4boatGoldhill39.8839.881,048,576
Pair 5toysgirl39.9039.881,048,576
Pair 6Elainesailboat39.8839.881,048,576
Table 3. Joint cheat detection ratio for the six shadow pairs.
Table 3. Joint cheat detection ratio for the six shadow pairs.
Tampered ShadowDRJ
Lena0.42
Tiffany0.42
airplane0.42
boat0.42
toys0.42
Elaine0.42
Table 4. Blind cheater detection ratio for the six tampered shadows.
Table 4. Blind cheater detection ratio for the six tampered shadows.
Tampered ShadowDRB1
Lena0.20
Tiffany0.20
airplane0.20
boat0.20
toys0.20
Elaine0.20
Table 5. DR values for the six combinatorial tampered shadow pairs.
Table 5. DR values for the six combinatorial tampered shadow pairs.
Shadow 1Shadow 2 D R 1 D R 2 D R 1 2 D R 1 2
Pair 1Lanababoon0.430.430.720.52
Pair 2TiffanyBarbara0.420.420.730.52
Pair 3airplanepeppers0.440.420.730.53
Pair 4boatGoldhill0.430.430.710.52
Pair 5toysgirl0.430.430.710.53
Pair 6Elainesailboat0.430.430.720.53
Table 6. Comparison of the proposed maze matrix-based scheme with the turtle shell-based scheme.
Table 6. Comparison of the proposed maze matrix-based scheme with the turtle shell-based scheme.
Hiding SchemePSNREC D R J S D R J C D R B
Maze matrix39.8840.430.720.20
Turtle shell [26]41.7130.500.50
Table 7. Efficiency comparison of the proposed embedding scheme with conventional scheme.
Table 7. Efficiency comparison of the proposed embedding scheme with conventional scheme.
Cover ImagesExecution Time (sec)
Conventional SchemeProposed Scheme
Pair 10.12970.0692
Pair 20.14250.0747
Pair 30.10740.0737
Pair 40.10300.0703
Pair 50.11100.0708
Pair 60.10550.0709
Average0.11650.0716
Table 8. Efficiency of the extraction scheme.
Table 8. Efficiency of the extraction scheme.
Stego ImagesExecution Time (sec)
Pair 10.0366
Pair 20.0361
Pair 30.0382
Pair 40.0366
Pair 50.0411
Pair 60.0348
Average0.0372

Share and Cite

MDPI and ACS Style

Chang, C.-C.; Horng, J.-H.; Shih, C.-S.; Chang, C.-C. A Maze Matrix-Based Secret Image Sharing Scheme with Cheater Detection. Sensors 2020, 20, 3802. https://doi.org/10.3390/s20133802

AMA Style

Chang C-C, Horng J-H, Shih C-S, Chang C-C. A Maze Matrix-Based Secret Image Sharing Scheme with Cheater Detection. Sensors. 2020; 20(13):3802. https://doi.org/10.3390/s20133802

Chicago/Turabian Style

Chang, Ching-Chun, Ji-Hwei Horng, Chia-Shou Shih, and Chin-Chen Chang. 2020. "A Maze Matrix-Based Secret Image Sharing Scheme with Cheater Detection" Sensors 20, no. 13: 3802. https://doi.org/10.3390/s20133802

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop