Skip to main content
Log in

Novel key-integration to safeguard counting-based secret-sharing from possibilities of cyberattack breaches

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In the face of malicious cyberattacks, classic security approaches like cryptography and steganography are becoming not sufficient. Secrecy are normally maintained by single party holding control over data causing it possibly being lost or revealed, with or without consciousness. Secret sharing can provide assistance unifying decisions by multi-authorized individuals distributing the target-key over several authorized participants, requested to interact for reconstructing the keys to reveal the privacy. Lately, counting-based secret sharing (CBSS) has been under focus being optimistic, as potential secret sharing scheme that is fast, intuitive, and practical. A primary limitation with this scheme is its restricted number of generated key-shares, which was deployed in the matrix-based secret sharing scheme. Unfortunately, the simple intuition behind these schemes made them prone to smart cyberattacks that can make uncovering the target-key dishonestly possible. In this paper, we demonstrate significant cyberattack weakness in the CBSS scheme, that also applies to the matrix-based scheme making them both unsafely vulnerable to selected key-shares integration. We introduce a novel algorithm that can defend this speculating existence of target-key suffering via exploring the problem deeply and advising appropriate protection procedure. The study enhances the structure secrecy to ensure that the key-shares are fully safeguarded. Our work further tests the security of the CBSS scheme protection strategy experimentations demonstrating remarked organisation robustness as well as possibility of producing sophisticated, versatile security system, to overcome breaching weaknesses of key-shares components for current ongoing developing IT utilizations.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Data availability

Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.

References

  1. Kini N et al (2019) A secured steganography algorithm for hiding an image in an image. Stud Comput Intell 771:539–546. https://doi.org/10.1007/978-981-10-8797-4_54

    Article  Google Scholar 

  2. Al-Qurashi A et al (2018) Reliable secret key generation for counting-based secret sharing. J Comput Sci Comput Math 8(4):87–101. https://doi.org/10.20967/jcscm.2018.04.006

    Article  Google Scholar 

  3. Gutub A, Al-Juaid N, Khan E (2019) Counting-based secret sharing technique for multimedia applications. Multimed Tools Appl (MTAP) 78(5):5591–5619

    Article  Google Scholar 

  4. Gutub A, Al-Ghamdi M (2020) Hiding shares by multimedia image steganography for optimized counting-based secret sharing. Multimed Tools Appl 79(11–12):7951–7985. https://doi.org/10.1007/s11042-019-08427-x

    Article  Google Scholar 

  5. Gutub A, Al-Ghamdi M (2019) Image based steganography to facilitate improving counting-based secret sharing. 3D Display Res Center 10(1)

  6. Shamir A (1979) How to Share a Secret. Commun ACM 22(11):612–613. https://doi.org/10.1145/359168.359176

    Article  MathSciNet  Google Scholar 

  7. Blakley G (1979) Safeguarding cryptographic keys, 1979 Int Work Manag Requir Knowledge, MARK 1979:313–317, https://doi.org/10.1109/MARK.1979.8817296

  8. Gutub A, Alaseri K (2021) Refining arabic text stego-techniques for shares memorization of counting-based secret sharing. J King Saud Univ - Comp Inf Sci 33(9):1108–1120

    Google Scholar 

  9. Porwal S, Mittal S (2020) A threshold secret sharing technique based on matrix manipulation. AIP Conf Proc 2214. https://doi.org/10.1063/5.0003358

  10. Gutub A (2022) Boosting image watermarking authenticity spreading secrecy from counting-based secret-sharing. CAAI Trans Intell Technol. https://doi.org/10.1049/cit2.12093

    Article  Google Scholar 

  11. Gutub A, AlKhodaidi T (2020) Smart expansion of target key for more handlers to access multimedia counting-based secret sharing. Multimed Tools Appl 79(25–26):17373–17401. https://doi.org/10.1007/s11042-020-08695-y

    Article  Google Scholar 

  12. Al-Ghamdi M et al (2019) Security enhancement of shares generation process for multimedia counting-based secret-sharing technique. Multimed Tools Appl 78(12):16283–16310. https://doi.org/10.1007/s11042-018-6977-2

    Article  Google Scholar 

  13. AlKhodaidi T et al (2020) Trustworthy target key alteration helping counting-based secret sharing applicability. Arab J Sci Eng (AJSE) 45(4):3403–3423. https://doi.org/10.1007/s13369-020-04422-9

    Article  Google Scholar 

  14. Beimel A (2011) Secret-sharing schemes: A survey. Lect Notes Comput Sci LNCS 6639:11–46. https://doi.org/10.1007/978-3-642-20901-7_2

    Article  MathSciNet  Google Scholar 

  15. Blundo C et al (1994) Fully dynamic secret sharing schemes. Lect Notes Comput Sci LNCS 773:110–125. https://doi.org/10.1007/3-540-48329-2_10

    Article  MathSciNet  Google Scholar 

  16. Kaya K et al (2006) Threshold cryptography based on asmuth-bloom secret sharing. Lect Notes Comput Sci LNCS 4263:935–942. https://doi.org/10.1007/11902140_97

    Article  Google Scholar 

  17. Bai L, Zou XK (2009) A proactive secret sharing scheme in matrix projection method. Int J Secur Netw 4(4):201–209. https://doi.org/10.1504/IJSN.2009.028667

    Article  Google Scholar 

  18. Blundo C, De Santis A, Di Crescenzo G, Gaggia AG, Vaccaro U (1994) Multi-secret sharing schemes. Lect Notes Comput Sci LNCS 839:150–163. https://doi.org/10.1007/3-540-48658-5_17

    Article  Google Scholar 

  19. Chien HY, Jan JK, Tseng YM (2000) A practical (t, n) multi-secret sharing scheme. https://www.researchgate.net/publication/279945302

  20. Di Crescenzo G (2003) Sharing one secret vs. sharing many secrets. Theoret Comput Sci 295(1–3):123–140. https://doi.org/10.1016/S0304-3975(02)00399-7

    Article  MathSciNet  Google Scholar 

  21. Tassa T (2004) Hierarchical threshold secret sharing. Lect Notes Comput Sci LNCS 2951:473–490. https://doi.org/10.1007/978-3-540-24638-1_26

    Article  MathSciNet  Google Scholar 

  22. Herzberg A, Jarecki S, Krawczyk H, Yung M (1995) Proactive secret sharing or: How to cope with perpetual leakage. Lect Notes Comput Sci LNCS 963:339–352. https://doi.org/10.1007/3-540-44750-4_27

    Article  Google Scholar 

  23. Laih CS, Harn L, Lee JY, Hwang T (1990) Dynamic threshold scheme based on the definition of cross-product in an N-dimensional linear space. Lect Notes Comput Sci LNCS 435:286–298. https://doi.org/10.1007/0-387-34805-0_26

    Article  MathSciNet  Google Scholar 

  24. Blundo C, De Santis A, Gargano L, Vaccaro U (1994) Secret sharing schemes with veto capabilities. Lect Notes Comput Sci LNCS 781:82–89. https://doi.org/10.1007/3-540-57843-9_11

    Article  Google Scholar 

  25. Zhang E, Zhu J, Li G, Chang J, Li Y (2019) Outsourcing hierarchical threshold secret sharing scheme based on reputation. Secur Commun Netw 2019. https://doi.org/10.1155/2019/6989383

  26. Saeidi Z et al (2024) High performance image steganography integrating IWT and Hamming code within secret sharing. IET Image Proc 18(1):129–139. https://doi.org/10.1049/ipr2.12938

    Article  Google Scholar 

  27. Gutub A, Al-Qurashi A (2020) Secure shares generation via m-blocks partitioning for counting-based secret sharing. J Eng Res 8(3):91–117. https://doi.org/10.36909/JER.V8I3.8079

    Article  Google Scholar 

  28. Gutub A, Al-Shaarani F (2020) Efficient implementation of multi-image secret hiding based on LSB and DWT steganography comparisons. Arab J Sci Eng 45(4):2631–2644. https://doi.org/10.1007/s13369-020-04413-w

    Article  Google Scholar 

  29. Elharrouss O et al (2020) An image steganography approach based on k-least significant bits (k-LSB). 2020 IEEE Int Conf Informatics IoT Enabling Technol ICIoT 2020 no. February:131–135. https://doi.org/10.1109/ICIoT48696.2020.9089566

  30. Aljarf A et al (2023) Integrating machine learning and features extraction for practical reliable color images steganalysis classification. Soft Comput 27(19):13877–13888. https://doi.org/10.1007/s00500-023-09042-7

    Article  Google Scholar 

  31. Gutub A, Al-Ghamdi M (2019) Accommodating secret sharing technique for personal remembrance via steganography. 2019 Int Conf Fourth Ind Revolution, ICFIR 2019, 1–6 https://doi.org/10.1109/ICFIR.2019.8894784

  32. Al-Shaarani F et al (2022) Securing matrix counting-based secret-sharing involving crypto steganography. J King Saud Univ - Comput Inf Sci 34(9):6909–6924. https://doi.org/10.1016/J.JKSUCI.2021.09.009

    Article  Google Scholar 

  33. Al-Shaarani F et al (2021) Increasing participants using counting-based secret sharing via involving matrices and practical steganography. Arab J Sci Eng 2021 472, 47(2):2455–2477. https://doi.org/10.1007/S13369-021-06165-7

  34. Almehmadi E et al (2022) Novel Arabic e-text watermarking supporting partial dishonesty based on counting-based secret sharing. Arab J Sci Eng 47(2):2585–2609. https://doi.org/10.1007/S13369-021-06200-7/TABLES/9

    Article  Google Scholar 

  35. Gutub A (2022) Adopting counting-based secret-sharing for e-Video Watermarking allowing Fractional Invalidation. Multimed Tools Appl 2022 817,81(7):9527–9547. https://doi.org/10.1007/S11042-022-12062-4

  36. Gutub A (2022) Integrity verification of Holy Quran verses recitation via incomplete watermarking authentication. Int J Speech Technol, Springer ISSN: 1572–8110, 25(4):997–1011. https://doi.org/10.1007/s10772-022-09999-0

  37. Hemalatha J et al (2023) Towards improving the performance of blind image steganalyzer using third-order SPAM features and ensemble classifier. Journal of Information Security and Applications 76:10354. Elsevier. https://doi.org/10.1016/j.jisa.2023.103541

  38. Alkhudaydi M et al (2020) Integrating light-weight cryptography with diacritics arabic text steganography improved for practical security applications. J Inf Secur Cybercrimes Res (JISCR) 3(1):13–30. https://doi.org/10.26735/FMIT1649

    Article  Google Scholar 

  39. Al-Roithy B et al (2021) Remodeling randomness prioritization to boost-up security of RGB image encryption. Multimed Tools Appl (MTAP) 80(18):28521–28581. https://doi.org/10.1007/s11042-021-11051-3

    Article  Google Scholar 

  40. Kheshaifaty N et al (2021) Engineering graphical captcha and AES crypto hash functions for secure online authentication. J Eng Res (JER), in press. https://doi.org/10.36909/jer.13761

  41. Sahu AK et al (2022) Improving grayscale steganography to protect personal information disclosure within hotel services. Multimed Tools Appl (MTAP) 81(21):30663–30683. https://doi.org/10.1007/s11042-022-13015-7

    Article  Google Scholar 

  42. Gutub A (2023) Adjusting counting-based secret-sharing via personalized passwords and email-authentic reliability. J Eng Res (JER). https://doi.org/10.1016/j.jer.2023.09.014

    Article  Google Scholar 

  43. Roslan NA et al (2022) Systematic literature review and analysis for Arabic text steganography method practically. Egypt Inform J Elsevier 23(4):177–191. https://doi.org/10.1016/j.eij.2022.10.003

    Article  Google Scholar 

  44. AlJarf A et al (2024) Is blind image steganalysis practical using feature-based classification? Multimed Tools Appl 83(2):4579–4612. https://doi.org/10.1007/s11042-023-15682-6

  45. Gutub A (2024) Regulating Kashida Arabic steganography to improve security and capacity performance. Multimed Tools Appl. https://doi.org/10.1007/s11042-024-18946-x

    Article  Google Scholar 

  46. Gutub A (2024) Emerging Arabic text watermarking utilizing combinations of different diacritics. Arab J Sci Eng. https://doi.org/10.1007/s13369-023-08629-4

    Article  Google Scholar 

  47. Gutub A, Almehmadi E (2023) Upgrading script watermarking robustness of unusual-to-tolerate functional confirmation by secret-sharing. J Eng Res 11(4):392–403. https://doi.org/10.1016/j.jer.2023.100099

    Article  Google Scholar 

  48. Gutub A, Almehmadi E (2023) Advancing partial verification of watermarking for Arabic text via utilization of innovative counting-based secret sharing. Arab J Sci Eng 48(8):9963–9989. https://doi.org/10.1007/s13369-022-07387-z

    Article  Google Scholar 

  49. Abu-Hashem M et al (2023) Discrepancies of remote techno-tolerance due to COVID-19 pandemic within Arab middle-east countries.  J Umm Al-Qura Univ Eng Archit 14(3):151–165. https://doi.org/10.1007/s43995-023-00026-0

    Article  Google Scholar 

  50. Singh A et al (2023) Redefining food safety traceability system through blockchain: findings challenges and open issues. Multimed Tools Appl 82(14):21243–21277. https://doi.org/10.1007/s11042-022-14006-4

    Article  Google Scholar 

  51. Sufi F et al (2023) Automating global threat-maps generation via advancements of news sensors and AI. Arab J Sci Eng 48(2):2455–2472. https://doi.org/10.1007/s13369-022-07250-1

    Article  Google Scholar 

  52. Thabit R et al (2022) CSNTSteg: Color spacing normalization text steganography model to improve capacity and invisibility of hidden data. IEEE Access 10:65439–65458. https://doi.org/10.1109/ACCESS.2022.3182712

    Article  Google Scholar 

  53. Roy KP et al (2023) Analysis of community question-answering issues via machine learning and deep learning: State-of-the-art review. CAAI Transactions on Intelligence Technology 8(1):95–117

    Article  Google Scholar 

Download references

Acknowledgements

Thanks to Umm Al-Qura University (UQU) for motivating this research. All appreciation to my genius graduate students of Computer Engineering course: Advanced Topics in Information Security (1400519) as well as students of Computer & Information Security course (14034107-3) and Cryptography & Network Security course (14034108-3) offered both by Computer Engineering Department during 2023 and 2024, as all their collaborative work remarked attractive contribution and completion used within this paper. Thanks to our great school, Umm Al-Qura University – Makkah, for supporting research international visits to focus working out the Cybersecurity research hoping to continue offering the MS graduate program as well as allowing for PhD, approved by Ministry of Education within Saudi Arabia, opening doors for progressive scientific activities.

Funding

There is no funding source.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Adnan Gutub.

Ethics declarations

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Informed consent

Informed consent was obtained from all individual participants included in the study.

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Agreement

We declare that this work is original and not considered to be published in any other publication media.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gutub, A., Al-Shaarani, F. & Alharthi, K. Novel key-integration to safeguard counting-based secret-sharing from possibilities of cyberattack breaches. Multimed Tools Appl (2024). https://doi.org/10.1007/s11042-024-19027-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11042-024-19027-9

Keywords

Navigation