A Secure and Verifiable Secret Sharing Scheme Using Neural Steganography and Hash-Based Authentication

Document Type : Research Article

Authors

1 Department of Math and Computer Science , Damghan University, Damghan, Semnan, Iran

2 School of Engineering, Damghan University, Damghan, Semnan, Iran

3 Faculty of Mathematics and Computer Science, Damghan university, Damghan, Semnan,Iran

10.22042/isecure.2026.242016
Abstract
This study presents a resilient and efficient architecture for securely distributing secrets to the public across untrusted networks. The proposed method integrates Shamir’s Verifiable Secret Sharing with AES-GCM encryption to provide strong confidentiality and authentication guarantees. Each share is reinforced with cryptographic hash-based signatures and imperceptibly embedded within cover images using a neural steganographic framework based on an Attention U-Net enhanced with transformer mechanisms and Squeeze-and-Excitation blocks, allowing the system to place data in visually insensitive regions adaptively. The training process leverages a joint perceptual and structural loss function, ensuring high visual fidelity while preserving critical image features for robust message recovery. Experimental evaluations demonstrate superior performance in Peak Signal-to-Noise Ratio and Structural Similarity Index Measure, and a minimal Bit Error Rate across various distortions, including noise, blurring, and JPEG compression. Compared to existing methods, the framework provides enhanced protection against fraudulent participants or dealers, eliminates reliance on secure private channels, and enables the reuse of system components, offering a comprehensive solution for safe, verifiable secret sharing. 

Keywords


[1] A. Beimel. Secret-sharing schemes: A survey. In International Conference on Coding and Cryptology, pages 11–46, Berlin, Heidelberg, 2011. Springer. URL https://doi.org/10.1007/ 978-3-642-20901-7_2.
[2] T. Tassa. Hierarchical threshold secret sharing. Journal of Cryptology, 20:237–264, 2007. URL https://doi.org/10.1007/s00145-0060334-8.
[3] I. Alam, A. S. Alali, S. Ali, and M. S. M. Asri. A verifiable multi-secret sharing scheme for hierarchical access structure. Axioms, 13(8): 515, 2024. URL https://doi.org/10.3390/ axioms13080515.
[4] A. Kaur, R. Kaur, and N. Kumar. A review on image steganography techniques. International Journal of Computer Applications, 123(4): 20–24, 2015. URL https://doi.org/10.5120/ ijca2015905280.
[5] A. Gutub and M. Al-Ghamdi. Hiding shares by multimedia image steganography for optimized counting-based secret sharing. Multimedia Tools and Applications, 79(11):7951–7985, 2020. URL https://doi.org/10.1007/s11042-01908427-x.
[6] K. Gao, Y. Wang, H. Li, and L. Zhang. Steganographic secret sharing via ai-generated photorealistic images. EURASIP Journal on Wireless Communications and Networking, 2022(1): Article 190, 2022. URL https://doi.org/10. 1186/s13638-022-02190-8.
[7] M. Farhadi, H. Bypour, and R. Mortazavi. An efficient secret sharing-based storage system for cloud-based iots. In 2019 16th International ISC Conference on Information Security and Cryptology (ISCISC), pages 122–127, Mashhad, Iran, 2019. URL https://doi.org/10.1109/ ISCISC48546.2019.8985146.
[8] Z. I. Nezami, H. Ali, M. Asif, H. Aljuaid, I. Hamid, and Z. Ali. An efficient and secure technique for image steganography using a hash function. PeerJ Computer Science, 8(2):e1157, 2022.
[9] J. Chen, H. Deng, H. Su, M. Yuan, and Y. Ren. Lattice-based threshold secret sharing scheme and its applications: A survey. Electronics, 13 (2):287, 2024. URL https://doi.org/10.3390/ electronics13020287.
[10] H. Yang, Y. Xu, X. Liu, and X. Ma. Pris: Practical robust invertible network for image steganography. arXiv, 2023. URL https://doi.org/10. 48550/arXiv.2309.13620.
[11] S. Atapoor, K. Baghery, D. Cozzo, and R. Pedersen. Vss from distributed zk proofs and applications. Technical Report 2023/992, Cryptology ePrint Archive, 2023. URL https://eprint. iacr.org/2023/992.
[12] P. Ji, Y. Zhang, and Z. Lv. Edge-guided dualstream u-net for secure image steganography. Applied Sciences, 15(8):4413, 2025. URL https: //doi.org/10.3390/app15084413.
[13] G. Li, S. Li, Z. Qian, and X. Zhang. Coverseparable fixed neural network steganography via deep generative models. In Proceedings of the 32nd ACM International Conference on Multimedia, pages 11719–11728, 2024.
[14] H. Zhou. Private neural network training with packed secret sharing. In Y. Chen, X. Gao, X. Sun, and A. Zhang, editors, Computing and Combinatorics: COCOON 2024, volume 15161 of Lecture Notes in Computer Science, pages 66–77. Springer, Singapore, 2025. URL https: //doi.org/10.1007/978-981-96-1090-7_6.
[15] Z. Saeidi, A. Yazdi, S. Mashhadi, M. Hadian, and A. Gutub. High performance image steganography integrating iwt and hamming code within secret sharing. IET Image Processing, 18(1):129– 139, 2024. URL https://doi.org/10.1049/ ipr2.12938.
[16] C. C. Lin and W. H. Tsai. Secret image sharing with steganography and authentication. Journal of Systems and Software, 73(3):405–414, 2004.
[17] Z. Eslami, S. H. Razzaghi, and J. Z. Ahmadabadi. Secret image sharing based on cellular automata and steganography. Pattern Recognition, 43(1):397–404, 2010. URL https://doi. org/10.1016/j.patcog.2009.06.007.
[18] P. Singh and N. Sharma. Authentication and integrity verification in secret sharing schemes using lattice-based digital signatures. IEEE Transactions on Dependable and Secure Computing, 2023. URL https://doi.org/10.1109/TDSC. 2023.3278491. Advance online publication.
[19] K. Wo´zniak, M. R. Ogiela, and L. Ogiela. A twophase embedding approach for secure distributed steganography. Sensors, 25(5):1448, 2025. URL https://doi.org/10.3390/s25051448.
[20] V. Rajkumar, M. Prakash, and V. Vennila. Secure data sharing with confidentiality, integrity and access control in cloud environment. Computer Systems Science & Engineering, 40(2), 2022. URL https://doi.org/10.32604/CSSE. 2022.019622.
[21] W. Shen, J. Qin, J. Yu, R. Hao, and J. Hu. Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage. IEEE Transactions on Information Forensics and Security, 14(2):331– 346, 2018.
[22] L. Chen, D. Moody, A. Regenscheid, and A. Robinson. Digital signature standard (dss). Technical report, NIST, 2023.
[23] Z. Chen, T. Liu, J.-J. Huang, W. Zhao, X. Bi, and M. Wang. Invertible mosaic image hiding network for very large capacity image steganography. arXiv, 2023. URL https://doi.org/10. 48550/arXiv.2309.08987.
[24] S. Sharma, S. Shivani, and N. Saxena. A selfauthenticating multi-tone secret sharing scheme using meaningful shares for satellite images. IEEE Access, 2024.
[25] J. E. Nalavade, A. Patil, A. Buchade, and N. Jadhav. Deep neural network and gan-based reversible data hiding in encrypted images: A privacy-preserving approach. SN Computer Science, 5(1):45, 2023. URL https://doi.org/10. 1007/s42979-023-02347-2.
[26] Y. Peng, Y. Wang, D. Hu, K. Chen, X. Rong, and W. Zhang. Stegaddpm: Generative image steganography based on denoising diffusion probabilistic model. In Proceedings of the 32nd ACM International Conference on Multimedia, pages 3001–3009, 2024. URL https://doi.org/10. 1145/3581783.3612514.

Articles in Press, Accepted Manuscript
Available Online from 14 March 2026