Multimedia Tools and Applications

, Volume 76, Issue 3, pp 3851–3870 | Cite as

XOR based continuous-tone multi secret sharing for store-and-forward telemedicine

Article
  • 121 Downloads

Abstract

Traditional k out of n visual cryptography scheme has been proposed to encrypt single secret image into n shares where only k or more shares can decode the secret image. Many existing schemes on visual cryptography are restricted to consider only binary images as secret which are not appropriate for many important applications. Store-and-Forward telemedicine is one such application where medical images are transmitted from one site to another via electronic medium to analyze the patient’s clinical health status. The main objective of Store-and-Forward telemedicine is to provide remote clinical services via two-way communication between the patient and the healthcare provider using electronic medical image, audio and video means. In this paper, a new XOR based Continuous-tone Multi Secret Sharing scheme suitable for store-and-forward telemedicine is proposed to securely transmit the medical images. It also eliminates basic security constraints of VC like pixel expansion in shares/recovered secret images, random pattern of shares, explicit codebook requirement, lossy recovery of secret and limitation on number of secret and shares. Proposed approach is n out of n multi secret sharing scheme which is able to transmit n secret images simultaneously. All secrets could be revealed only after some computations with all n shares and one master share. Master share has been created with the secret key at encoding phase and it can be regenerated at the time of decoding using same secret key. Here all shares are meaningful in continuous-tone which may provide confidentiality to medical images during transmission. Proposed approach not only preserves all basic characteristics of traditional VC but also increases the capacity of secret image sharing. From the experiments we found that irrespective of visible contents of the shares, the probability of getting back the pixel values of respective original secret images at the receiver end is very high.

Keywords

Visual cryptography Multi secret sharing Meaningful shares Unexpanded shares Telemedicine E-health Medical image security Telehelth 

References

  1. 1.
    Abdul-Aziz Gutub A, Abdul-Aziz Khan F (2012) Hybrid crypto hardware utilizing symmetric-key & public-key cryptosystems. In: Proceeding of international conference on advanced computer science applications and technologies, pp 116–121Google Scholar
  2. 2.
    Abdul-Aziz Gutub A, Khan EA (2011) Using subthreshold SRAM to design Low-Power crypto hardware. In: International journal on new computer architectures and their applications (IJNCAA), vol 1(2), pp 474–483Google Scholar
  3. 3.
    Abu-Marie W, Gutub A, Abu-Mansour H (2010) Image based steganography using truth table based and determinate array on RGB indicator. Int J Sign Imag Process 1:196–204Google Scholar
  4. 4.
    Al-Otaibi N A (2014) 2-leyer security system for hiding sensitive text data on personal computers. In: Proceeding of the 3rd international conference on advancements in information technology (ICAIT 2014), pp 73–79Google Scholar
  5. 5.
    Blundo C, Santis AD, Naor M (2000) Visual cryptography for grey level images. J Inf Process Lett 75(6):255–259MathSciNetCrossRefMATHGoogle Scholar
  6. 6.
    Chen C-C, Wu W-J (2014) A secure Boolean-based multi-secret image sharing scheme. J Syst Softw 92:107–114CrossRefGoogle Scholar
  7. 7.
    Chen C-C, Wu W-J (2014) A secure Boolean-based multi-secret image sharing scheme. J Syst Softw 92:107–114CrossRefGoogle Scholar
  8. 8.
    Chen T-H, Wu C-S (2011) Efficient multi-secret image sharing based on Boolean operations. Signal Process 91.1:90–97CrossRefMATHGoogle Scholar
  9. 9.
    Feng JB, Wu HC, Tsai CS, Chang YF, Chu YP (2008) Visual secret sharing for multiple secrets. Pattern Recogn 41:3572–3581CrossRefMATHGoogle Scholar
  10. 10.
    Gutub A, Al-Qahtani A, Tabakh A (2009) Triple-A: secure RGB image steganography based on randomization. In: 7th ACS/IEEE international conference on computer systems and applications, pp 400–403Google Scholar
  11. 11.
    Hsu H-C, Chen T-S, Lin Y-H (2004) The ring shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharing. In: Proceedings of the IEEE international conference on networking, sensing and control, Taipei, Taiwan, pp 996–1001Google Scholar
  12. 12.
    Khan F, Abdul-Aziz Gutub A (2007) Message concealment techniques using image based steganography. In: Proceeding of 4th IEEE GCC conference and exhibition, gulf international convention centre, Manamah, Bahrain, 11-14 November, pp 1–6Google Scholar
  13. 13.
    Liu F, Wu CK (2010) Optimal xor based (2,n) visual cryptography schemes. In: IACR Cryptol, 545, eprint archiveGoogle Scholar
  14. 14.
    Naor M, Shamir A (1995) Visual cryptography. In: Advances in cryptograhy: EUROCRYPT94, LNCS, vol 950, pp 1–12Google Scholar
  15. 15.
    Shyu SJ, Huang S-Y, Lee Y-K, Wang R-Z, Chen K (2007) Sharing multiple secrets in visual cryptography. Pattern Recogn 40:3633–3651CrossRefMATHGoogle Scholar
  16. 16.
    Taghaddos D, Latif A (2014) Visual cryptography for gray-scale images using bit-level. In: Journal of information hiding and multimedia signal processing, ubiquitous international, vol 5(1), pp 90– 98Google Scholar
  17. 17.
    Tuyls P, Hollmann H, Lint J, Tolhuizen L (2005) Xor-based visual cryptography schemes. Des Codes Crypt 37(1):169–186MathSciNetCrossRefMATHGoogle Scholar
  18. 18.
    Tuyls P, Hollmann HD, VanLint JH, Tolhuizen L (2005) XOR-Based visual cryptography schemes. Des Codes Crypt 37:169–186MathSciNetCrossRefMATHGoogle Scholar
  19. 19.
    Wang D-S, Song T, Dong L, Yang C-N (2013) Optimal contrast grayscale visual cryptography schemes with reversing. IEEE Trans Inf Forensics Secur 8(12):2059–2072CrossRefGoogle Scholar
  20. 20.
    Wu CC, Chen LH (1998) A study on visual cryptography. Master Thesis. PhD thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R.O.CGoogle Scholar
  21. 21.
    Wu H-C, Chang C-C (2005) Sharing visual multi-secrets using circle shares. Comput Stand Interfaces 134(28):123–135CrossRefGoogle Scholar
  22. 22.
    Wu X, Ou D, Dai L, Sun W (2013) XOR based meaningful visual secret sharing by generalized random grids. In: Proceedings of the first ACM workshop on information hiding and multimedia security ACM, pp 181–190Google Scholar
  23. 23.
    Wu X, Sun W (2013) Generalized random grid and its applications in visual cryptography. IEEE Trans Inf Forensics Secur 8(9):1541–1553CrossRefGoogle Scholar
  24. 24.
    Wu X, Sun W (2013) Random grid-based visual secret sharing with abilities of or and xor decryptions. J Vis Commun Image Represent 24(1):48–62CrossRefGoogle Scholar
  25. 25.
    Yamaguchi Y (2015) Extended visual cryptography for continuous-tone images: effect of the optimum tone mapping. Int J Inf Commun Technol 7(1):25–39Google Scholar
  26. 26.
    Yang C-N, Chen C-H, Cai S-R (2015) Enhanced Boolean-based multi secret image sharing scheme. J Syst Softw 116:22–34CrossRefGoogle Scholar
  27. 27.
    Yang CN, Wang DS (2014) Property analysis of XOR-based visual cryptography. IEEE Trans Circuits Syst Video Technol 24(2):189–197CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  • Shivendra Shivani
    • 1
  • B. Rajitha
    • 2
  • Suneeta Agarwal
    • 2
  1. 1.Thapar UniversityPatialaIndia
  2. 2.National Institute of TechnologyAllahabadIndia

Personalised recommendations