Abstract
In the face of malicious cyberattacks, classic security approaches like cryptography and steganography are becoming not sufficient. Secrecy are normally maintained by single party holding control over data causing it possibly being lost or revealed, with or without consciousness. Secret sharing can provide assistance unifying decisions by multi-authorized individuals distributing the target-key over several authorized participants, requested to interact for reconstructing the keys to reveal the privacy. Lately, counting-based secret sharing (CBSS) has been under focus being optimistic, as potential secret sharing scheme that is fast, intuitive, and practical. A primary limitation with this scheme is its restricted number of generated key-shares, which was deployed in the matrix-based secret sharing scheme. Unfortunately, the simple intuition behind these schemes made them prone to smart cyberattacks that can make uncovering the target-key dishonestly possible. In this paper, we demonstrate significant cyberattack weakness in the CBSS scheme, that also applies to the matrix-based scheme making them both unsafely vulnerable to selected key-shares integration. We introduce a novel algorithm that can defend this speculating existence of target-key suffering via exploring the problem deeply and advising appropriate protection procedure. The study enhances the structure secrecy to ensure that the key-shares are fully safeguarded. Our work further tests the security of the CBSS scheme protection strategy experimentations demonstrating remarked organisation robustness as well as possibility of producing sophisticated, versatile security system, to overcome breaching weaknesses of key-shares components for current ongoing developing IT utilizations.
Similar content being viewed by others
Data availability
Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.
References
Kini N et al (2019) A secured steganography algorithm for hiding an image in an image. Stud Comput Intell 771:539–546. https://doi.org/10.1007/978-981-10-8797-4_54
Al-Qurashi A et al (2018) Reliable secret key generation for counting-based secret sharing. J Comput Sci Comput Math 8(4):87–101. https://doi.org/10.20967/jcscm.2018.04.006
Gutub A, Al-Juaid N, Khan E (2019) Counting-based secret sharing technique for multimedia applications. Multimed Tools Appl (MTAP) 78(5):5591–5619
Gutub A, Al-Ghamdi M (2020) Hiding shares by multimedia image steganography for optimized counting-based secret sharing. Multimed Tools Appl 79(11–12):7951–7985. https://doi.org/10.1007/s11042-019-08427-x
Gutub A, Al-Ghamdi M (2019) Image based steganography to facilitate improving counting-based secret sharing. 3D Display Res Center 10(1)
Shamir A (1979) How to Share a Secret. Commun ACM 22(11):612–613. https://doi.org/10.1145/359168.359176
Blakley G (1979) Safeguarding cryptographic keys, 1979 Int Work Manag Requir Knowledge, MARK 1979:313–317, https://doi.org/10.1109/MARK.1979.8817296
Gutub A, Alaseri K (2021) Refining arabic text stego-techniques for shares memorization of counting-based secret sharing. J King Saud Univ - Comp Inf Sci 33(9):1108–1120
Porwal S, Mittal S (2020) A threshold secret sharing technique based on matrix manipulation. AIP Conf Proc 2214. https://doi.org/10.1063/5.0003358
Gutub A (2022) Boosting image watermarking authenticity spreading secrecy from counting-based secret-sharing. CAAI Trans Intell Technol. https://doi.org/10.1049/cit2.12093
Gutub A, AlKhodaidi T (2020) Smart expansion of target key for more handlers to access multimedia counting-based secret sharing. Multimed Tools Appl 79(25–26):17373–17401. https://doi.org/10.1007/s11042-020-08695-y
Al-Ghamdi M et al (2019) Security enhancement of shares generation process for multimedia counting-based secret-sharing technique. Multimed Tools Appl 78(12):16283–16310. https://doi.org/10.1007/s11042-018-6977-2
AlKhodaidi T et al (2020) Trustworthy target key alteration helping counting-based secret sharing applicability. Arab J Sci Eng (AJSE) 45(4):3403–3423. https://doi.org/10.1007/s13369-020-04422-9
Beimel A (2011) Secret-sharing schemes: A survey. Lect Notes Comput Sci LNCS 6639:11–46. https://doi.org/10.1007/978-3-642-20901-7_2
Blundo C et al (1994) Fully dynamic secret sharing schemes. Lect Notes Comput Sci LNCS 773:110–125. https://doi.org/10.1007/3-540-48329-2_10
Kaya K et al (2006) Threshold cryptography based on asmuth-bloom secret sharing. Lect Notes Comput Sci LNCS 4263:935–942. https://doi.org/10.1007/11902140_97
Bai L, Zou XK (2009) A proactive secret sharing scheme in matrix projection method. Int J Secur Netw 4(4):201–209. https://doi.org/10.1504/IJSN.2009.028667
Blundo C, De Santis A, Di Crescenzo G, Gaggia AG, Vaccaro U (1994) Multi-secret sharing schemes. Lect Notes Comput Sci LNCS 839:150–163. https://doi.org/10.1007/3-540-48658-5_17
Chien HY, Jan JK, Tseng YM (2000) A practical (t, n) multi-secret sharing scheme. https://www.researchgate.net/publication/279945302
Di Crescenzo G (2003) Sharing one secret vs. sharing many secrets. Theoret Comput Sci 295(1–3):123–140. https://doi.org/10.1016/S0304-3975(02)00399-7
Tassa T (2004) Hierarchical threshold secret sharing. Lect Notes Comput Sci LNCS 2951:473–490. https://doi.org/10.1007/978-3-540-24638-1_26
Herzberg A, Jarecki S, Krawczyk H, Yung M (1995) Proactive secret sharing or: How to cope with perpetual leakage. Lect Notes Comput Sci LNCS 963:339–352. https://doi.org/10.1007/3-540-44750-4_27
Laih CS, Harn L, Lee JY, Hwang T (1990) Dynamic threshold scheme based on the definition of cross-product in an N-dimensional linear space. Lect Notes Comput Sci LNCS 435:286–298. https://doi.org/10.1007/0-387-34805-0_26
Blundo C, De Santis A, Gargano L, Vaccaro U (1994) Secret sharing schemes with veto capabilities. Lect Notes Comput Sci LNCS 781:82–89. https://doi.org/10.1007/3-540-57843-9_11
Zhang E, Zhu J, Li G, Chang J, Li Y (2019) Outsourcing hierarchical threshold secret sharing scheme based on reputation. Secur Commun Netw 2019. https://doi.org/10.1155/2019/6989383
Saeidi Z et al (2024) High performance image steganography integrating IWT and Hamming code within secret sharing. IET Image Proc 18(1):129–139. https://doi.org/10.1049/ipr2.12938
Gutub A, Al-Qurashi A (2020) Secure shares generation via m-blocks partitioning for counting-based secret sharing. J Eng Res 8(3):91–117. https://doi.org/10.36909/JER.V8I3.8079
Gutub A, Al-Shaarani F (2020) Efficient implementation of multi-image secret hiding based on LSB and DWT steganography comparisons. Arab J Sci Eng 45(4):2631–2644. https://doi.org/10.1007/s13369-020-04413-w
Elharrouss O et al (2020) An image steganography approach based on k-least significant bits (k-LSB). 2020 IEEE Int Conf Informatics IoT Enabling Technol ICIoT 2020 no. February:131–135. https://doi.org/10.1109/ICIoT48696.2020.9089566
Aljarf A et al (2023) Integrating machine learning and features extraction for practical reliable color images steganalysis classification. Soft Comput 27(19):13877–13888. https://doi.org/10.1007/s00500-023-09042-7
Gutub A, Al-Ghamdi M (2019) Accommodating secret sharing technique for personal remembrance via steganography. 2019 Int Conf Fourth Ind Revolution, ICFIR 2019, 1–6 https://doi.org/10.1109/ICFIR.2019.8894784
Al-Shaarani F et al (2022) Securing matrix counting-based secret-sharing involving crypto steganography. J King Saud Univ - Comput Inf Sci 34(9):6909–6924. https://doi.org/10.1016/J.JKSUCI.2021.09.009
Al-Shaarani F et al (2021) Increasing participants using counting-based secret sharing via involving matrices and practical steganography. Arab J Sci Eng 2021 472, 47(2):2455–2477. https://doi.org/10.1007/S13369-021-06165-7
Almehmadi E et al (2022) Novel Arabic e-text watermarking supporting partial dishonesty based on counting-based secret sharing. Arab J Sci Eng 47(2):2585–2609. https://doi.org/10.1007/S13369-021-06200-7/TABLES/9
Gutub A (2022) Adopting counting-based secret-sharing for e-Video Watermarking allowing Fractional Invalidation. Multimed Tools Appl 2022 817,81(7):9527–9547. https://doi.org/10.1007/S11042-022-12062-4
Gutub A (2022) Integrity verification of Holy Quran verses recitation via incomplete watermarking authentication. Int J Speech Technol, Springer ISSN: 1572–8110, 25(4):997–1011. https://doi.org/10.1007/s10772-022-09999-0
Hemalatha J et al (2023) Towards improving the performance of blind image steganalyzer using third-order SPAM features and ensemble classifier. Journal of Information Security and Applications 76:10354. Elsevier. https://doi.org/10.1016/j.jisa.2023.103541
Alkhudaydi M et al (2020) Integrating light-weight cryptography with diacritics arabic text steganography improved for practical security applications. J Inf Secur Cybercrimes Res (JISCR) 3(1):13–30. https://doi.org/10.26735/FMIT1649
Al-Roithy B et al (2021) Remodeling randomness prioritization to boost-up security of RGB image encryption. Multimed Tools Appl (MTAP) 80(18):28521–28581. https://doi.org/10.1007/s11042-021-11051-3
Kheshaifaty N et al (2021) Engineering graphical captcha and AES crypto hash functions for secure online authentication. J Eng Res (JER), in press. https://doi.org/10.36909/jer.13761
Sahu AK et al (2022) Improving grayscale steganography to protect personal information disclosure within hotel services. Multimed Tools Appl (MTAP) 81(21):30663–30683. https://doi.org/10.1007/s11042-022-13015-7
Gutub A (2023) Adjusting counting-based secret-sharing via personalized passwords and email-authentic reliability. J Eng Res (JER). https://doi.org/10.1016/j.jer.2023.09.014
Roslan NA et al (2022) Systematic literature review and analysis for Arabic text steganography method practically. Egypt Inform J Elsevier 23(4):177–191. https://doi.org/10.1016/j.eij.2022.10.003
AlJarf A et al (2024) Is blind image steganalysis practical using feature-based classification? Multimed Tools Appl 83(2):4579–4612. https://doi.org/10.1007/s11042-023-15682-6
Gutub A (2024) Regulating Kashida Arabic steganography to improve security and capacity performance. Multimed Tools Appl. https://doi.org/10.1007/s11042-024-18946-x
Gutub A (2024) Emerging Arabic text watermarking utilizing combinations of different diacritics. Arab J Sci Eng. https://doi.org/10.1007/s13369-023-08629-4
Gutub A, Almehmadi E (2023) Upgrading script watermarking robustness of unusual-to-tolerate functional confirmation by secret-sharing. J Eng Res 11(4):392–403. https://doi.org/10.1016/j.jer.2023.100099
Gutub A, Almehmadi E (2023) Advancing partial verification of watermarking for Arabic text via utilization of innovative counting-based secret sharing. Arab J Sci Eng 48(8):9963–9989. https://doi.org/10.1007/s13369-022-07387-z
Abu-Hashem M et al (2023) Discrepancies of remote techno-tolerance due to COVID-19 pandemic within Arab middle-east countries. J Umm Al-Qura Univ Eng Archit 14(3):151–165. https://doi.org/10.1007/s43995-023-00026-0
Singh A et al (2023) Redefining food safety traceability system through blockchain: findings challenges and open issues. Multimed Tools Appl 82(14):21243–21277. https://doi.org/10.1007/s11042-022-14006-4
Sufi F et al (2023) Automating global threat-maps generation via advancements of news sensors and AI. Arab J Sci Eng 48(2):2455–2472. https://doi.org/10.1007/s13369-022-07250-1
Thabit R et al (2022) CSNTSteg: Color spacing normalization text steganography model to improve capacity and invisibility of hidden data. IEEE Access 10:65439–65458. https://doi.org/10.1109/ACCESS.2022.3182712
Roy KP et al (2023) Analysis of community question-answering issues via machine learning and deep learning: State-of-the-art review. CAAI Transactions on Intelligence Technology 8(1):95–117
Acknowledgements
Thanks to Umm Al-Qura University (UQU) for motivating this research. All appreciation to my genius graduate students of Computer Engineering course: Advanced Topics in Information Security (1400519) as well as students of Computer & Information Security course (14034107-3) and Cryptography & Network Security course (14034108-3) offered both by Computer Engineering Department during 2023 and 2024, as all their collaborative work remarked attractive contribution and completion used within this paper. Thanks to our great school, Umm Al-Qura University – Makkah, for supporting research international visits to focus working out the Cybersecurity research hoping to continue offering the MS graduate program as well as allowing for PhD, approved by Ministry of Education within Saudi Arabia, opening doors for progressive scientific activities.
Funding
There is no funding source.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Informed consent
Informed consent was obtained from all individual participants included in the study.
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Agreement
We declare that this work is original and not considered to be published in any other publication media.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Gutub, A., Al-Shaarani, F. & Alharthi, K. Novel key-integration to safeguard counting-based secret-sharing from possibilities of cyberattack breaches. Multimed Tools Appl (2024). https://doi.org/10.1007/s11042-024-19027-9
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11042-024-19027-9