Skip to main content

A Novel Visual Secret Sharing Scheme Using Affine Cipher and Image Interleaving

  • Conference paper
  • First Online:
Proceedings of International Conference on Computer Vision and Image Processing

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 460))

Abstract

Recently an interesting image sharing method for gray level images using Hill Cipher and RG-method has been introduced by Chen [1]. The method does not involve pixel expansion and image recovery is lossless. However, use of Hill Cipher requires a \(2\times 2\) integer matrix whose inverse should also be an integer matrix. Further, to extend the method for multi-secret sharing, one requires higher order integer matrices. This needs heavy computation and the choice of matrices is also very restricted, due to integer entry constraints. In the present paper we introduce an RG-based Visual Secret Sharing Scheme (VSS) scheme using image interleaving and affine cipher. Combined effect of image interleaving and affine transformation helps in improving the security of the secret images. Parameters of the affine cipher serve as keys and the random grid and encrypted image form the shares. No one can reveal the secret unless the keys and both the shares are known. Further, as opposed to the method in [1], the present scheme does not require invertible matrix with integer inverse. The scheme is also extended for multi-secret sharing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chen, W.K.: Image sharing method for gray-level images. Journal of Systems and Software 86 (2013) 581–585

    Article  Google Scholar 

  2. Naor, M., Shamir, A.: Visual cryptography. In: Advances in Cryptology EUROCRYPT’94, Springer (1995) 1–12

    Google Scholar 

  3. Kafri, O., Keren, E.: Encryption of pictures and shapes by random grids. Optics letters 12 (1987) 377–379

    Article  Google Scholar 

  4. Shyu, S.J.: Image encryption by multiple random grids. Pattern Recognition 42 (2009) 1582–1596

    Article  MATH  Google Scholar 

  5. Chen, T.H., Tsao, K.H.: Threshold visual secret sharing by random grids. Journal of Systems and Software 84 (2011) 1197–1208

    Article  Google Scholar 

  6. Guo, T., Liu, F., Wu, C.: k out of k extended visual cryptography scheme by random grids. Signal Processing 94 (2014) 90–101

    Article  Google Scholar 

  7. Wu, X., Sun, W.: Improved tagged visual cryptography by random grids. Signal Processing 97 (2014) 64–82

    Article  Google Scholar 

  8. William, S., Stallings, W.: Cryptography and Network Security, 4/E. Pearson Education India (2006)

    Google Scholar 

  9. De Palma, P., Frank, C., Gladfelter, S., Holden, J.: Cryptography and computer security for undergraduates. In: ACM SIGCSE Bulletin. Volume 36., ACM (2004) 94–95

    Google Scholar 

  10. Shyu, S.J., Huang, S.Y., Lee, Y.K., Wang, R.Z., Chen, K.: Sharing multiple secrets in visual cryptography. Pattern Recognition 40 (2007) 3633–3651

    Article  MATH  Google Scholar 

  11. Chen, L., Wu, C.: A study on visual cryptography. Diss. Master Thesis, National Chiao Tung University, Taiwan, ROC (1998)

    Google Scholar 

  12. Feng, J.B., Wu, H.C., Tsai, C.S., Chang, Y.F., Chu, Y.P.: Visual secret sharing for multiple secrets. Pattern Recognition 41 (2008) 3572–3581

    Article  MATH  Google Scholar 

  13. Hsu, H.C., Chen, T.S., Lin, Y.H.: The ringed shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharing. In: Networking, Sensing and Control, 2004 IEEE International Conference on. Volume 2., IEEE (2004) 996–1001

    Google Scholar 

  14. Bunker, S.C., Barasa, M., Ojha, A.: Linear equation based visual secret sharing scheme. In: Advance Computing Conference (IACC), 2014 IEEE International, 2014 IEEE (2014) 406–410

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Harkeerat Kaur .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Science+Business Media Singapore

About this paper

Cite this paper

Kaur, H., Ojha, A. (2017). A Novel Visual Secret Sharing Scheme Using Affine Cipher and Image Interleaving. In: Raman, B., Kumar, S., Roy, P., Sen, D. (eds) Proceedings of International Conference on Computer Vision and Image Processing. Advances in Intelligent Systems and Computing, vol 460. Springer, Singapore. https://doi.org/10.1007/978-981-10-2107-7_7

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-2107-7_7

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-2106-0

  • Online ISBN: 978-981-10-2107-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics