Abstract
Recently an interesting image sharing method for gray level images using Hill Cipher and RG-method has been introduced by Chen [1]. The method does not involve pixel expansion and image recovery is lossless. However, use of Hill Cipher requires a \(2\times 2\) integer matrix whose inverse should also be an integer matrix. Further, to extend the method for multi-secret sharing, one requires higher order integer matrices. This needs heavy computation and the choice of matrices is also very restricted, due to integer entry constraints. In the present paper we introduce an RG-based Visual Secret Sharing Scheme (VSS) scheme using image interleaving and affine cipher. Combined effect of image interleaving and affine transformation helps in improving the security of the secret images. Parameters of the affine cipher serve as keys and the random grid and encrypted image form the shares. No one can reveal the secret unless the keys and both the shares are known. Further, as opposed to the method in [1], the present scheme does not require invertible matrix with integer inverse. The scheme is also extended for multi-secret sharing.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Chen, W.K.: Image sharing method for gray-level images. Journal of Systems and Software 86 (2013) 581–585
Naor, M., Shamir, A.: Visual cryptography. In: Advances in Cryptology EUROCRYPT’94, Springer (1995) 1–12
Kafri, O., Keren, E.: Encryption of pictures and shapes by random grids. Optics letters 12 (1987) 377–379
Shyu, S.J.: Image encryption by multiple random grids. Pattern Recognition 42 (2009) 1582–1596
Chen, T.H., Tsao, K.H.: Threshold visual secret sharing by random grids. Journal of Systems and Software 84 (2011) 1197–1208
Guo, T., Liu, F., Wu, C.: k out of k extended visual cryptography scheme by random grids. Signal Processing 94 (2014) 90–101
Wu, X., Sun, W.: Improved tagged visual cryptography by random grids. Signal Processing 97 (2014) 64–82
William, S., Stallings, W.: Cryptography and Network Security, 4/E. Pearson Education India (2006)
De Palma, P., Frank, C., Gladfelter, S., Holden, J.: Cryptography and computer security for undergraduates. In: ACM SIGCSE Bulletin. Volume 36., ACM (2004) 94–95
Shyu, S.J., Huang, S.Y., Lee, Y.K., Wang, R.Z., Chen, K.: Sharing multiple secrets in visual cryptography. Pattern Recognition 40 (2007) 3633–3651
Chen, L., Wu, C.: A study on visual cryptography. Diss. Master Thesis, National Chiao Tung University, Taiwan, ROC (1998)
Feng, J.B., Wu, H.C., Tsai, C.S., Chang, Y.F., Chu, Y.P.: Visual secret sharing for multiple secrets. Pattern Recognition 41 (2008) 3572–3581
Hsu, H.C., Chen, T.S., Lin, Y.H.: The ringed shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharing. In: Networking, Sensing and Control, 2004 IEEE International Conference on. Volume 2., IEEE (2004) 996–1001
Bunker, S.C., Barasa, M., Ojha, A.: Linear equation based visual secret sharing scheme. In: Advance Computing Conference (IACC), 2014 IEEE International, 2014 IEEE (2014) 406–410
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Science+Business Media Singapore
About this paper
Cite this paper
Kaur, H., Ojha, A. (2017). A Novel Visual Secret Sharing Scheme Using Affine Cipher and Image Interleaving. In: Raman, B., Kumar, S., Roy, P., Sen, D. (eds) Proceedings of International Conference on Computer Vision and Image Processing. Advances in Intelligent Systems and Computing, vol 460. Springer, Singapore. https://doi.org/10.1007/978-981-10-2107-7_7
Download citation
DOI: https://doi.org/10.1007/978-981-10-2107-7_7
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-2106-0
Online ISBN: 978-981-10-2107-7
eBook Packages: EngineeringEngineering (R0)