Skip to main content
Log in

Cheating identifiable polynomial based secret sharing scheme for audio and image

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Polynomial based secret sharing is the art of protecting information and a tool used in areas where a secret has to be distributed among multiple parties. In this method, secret is encrypted into noisy shares and transferred to participants in the group. Decoding of secret is possible only when sufficient number of authorized members in the group, stack their respective shares. In this article, polynomial based secret sharing for audio is proposed that computes a checksum to identify the dishonest participant and also the audio shares generated are of smaller dimension. To achieve this, a polynomial function is defined by considering amplitude values and random values as coefficients. Inclusion of random value as the coefficient of higher degree term in the polynomial makes the audio shares noisy and does not provide any information about the secret. This reduces the overhead of performing preprocessing on original audio before shares are generated. In addition, our proposed method can be used for multi secret sharing. Proposed scheme also facilitates identification of dishonest participant before reconstruction of secret through a trusted entity called combiner.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Data availability

Not applicable.

Code availability

Not applicable.

References

  1. Abdelfatah RI (2020) Audio encryption scheme using self-adaptive bit scrambling and two multi chaotic-based dynamic DNA computations. IEEE Access 8:69894–69907. https://doi.org/10.1109/ACCESS.2020.2987197

    Article  Google Scholar 

  2. Abhishek P, Subhash K (2011) Space efficient secret sharing for implicit data security. Inf Sci 181:335–341. https://doi.org/10.1016/j.ins.2010.09.013

    Article  MathSciNet  Google Scholar 

  3. Blakley GR (1979) Safeguarding cryptographic keys. In: Proceedings of the AFIPS National Computer Conference, vol 48, pp 313–317

  4. Daniel S, Spyros SM (2005) General access structures in audio cryptography. IEEE International Conference on Electro Information Technology, Lincoln, NE, USA, pp 6. https://doi.org/10.1109/EIT.2005.1627018

  5. Dong X, Lixiang L, Haipeng P, Yixian Y (2017) A secure and efficient scalable secret image sharing scheme with flexible shadow sizes. PLoS One 12:1–17. https://doi.org/10.1371/journal.pone.0168674

    Article  Google Scholar 

  6. En Z, Ming L, Siu-Ming Y, Jiao D, Jun-Zhe Z, Gang-Gang J (2021) Fair hierarchical secret sharing scheme based on smart contract. Inf Sci 546:166–176. https://doi.org/10.1016/j.ins.2020.07.032

    Article  MathSciNet  Google Scholar 

  7. Harkeerat K, Pritee K (2020) Privacy preserving remote multi-server biometric authentication using cancelable biometrics and secret sharing. Future Gener Comput Syst 102:30–41. https://doi.org/10.1016/j.future.2019.07.023

    Article  Google Scholar 

  8. Hu W, Wu T, Chen Y, Shen Y, Yuan L (2021) A lossless secret image sharing scheme using a larger finite field. Multimed Tools Appl 80:28731–28743. https://doi.org/10.1007/s11042-021-11104-7

    Article  Google Scholar 

  9. Huan L, Zheng Q, Xuanping Z, Xu W (2011) Auditory cryptography security algorithm with audio shelters. Adv Control Eng Inf Sci-Procedia Eng 15:2695–2699. https://doi.org/10.1016/j.proeng.2011.08.507

    Article  Google Scholar 

  10. Jeonghun C, Sushil KS, Tae WK, Jong HP (2021) Blockchain-empowered cloud architecture based on secret sharing for smart city. J Inf Secur Appl 57:102686. https://doi.org/10.1016/j.jisa.2020.102686

    Article  Google Scholar 

  11. Jian S, Dengzhi L, Xingming S, Fushan W, Yang X (2020) Efficient cloud-aided verifiable secret sharing scheme with batch verification for smart cities. Future Gener Comput Syst 109:450–456. https://doi.org/10.1016/j.future.2018.10.049

    Article  Google Scholar 

  12. Kanso A, Ghebleh M (2018) An efficient lossless secret sharing scheme for medical images. J Vis Commun Image Represent 56:245–255. https://doi.org/10.1016/j.jvcir.2018.09.018

    Article  Google Scholar 

  13. Lake B, Mihailo I, Michel AK (2019) A secure and robust scheme for sharing confidential information in IoT systems. Ad Hoc Netw 92:101762. https://doi.org/10.1016/j.adhoc.2018.09.007

    Article  Google Scholar 

  14. Lakshmi VS, Deepthi S, Deepthi PP (2021) Collusion resistant secret sharing scheme for secure data storage and processing over cloud. J Inf Secur Appl 60:102869. https://doi.org/10.1016/j.jisa.2021.102869

    Article  Google Scholar 

  15. Lein H, Changlu L, Yong L (2015) Fair secret reconstruction in (t, n) secret sharing. J Inf Secur Appl 23:1–7. https://doi.org/10.1016/j.jisa.2015.07.001

    Article  Google Scholar 

  16. Lin CC, Tsai WH (2003) Secret image sharing with capability of share data reduction. Opt Eng 42:2340–2345. https://doi.org/10.1117/1.1588661

    Article  Google Scholar 

  17. Lin CC, Tsai WH (2004) Secret image sharing with steganography and authentication. J Syst Softw 73:405–414. https://doi.org/10.1016/S0164-1212(03)00239-5

    Article  Google Scholar 

  18. Ma Z, Ma Y, Huang X, Zhang M, Liu Y (2020) Applying cheating identifiable secret sharing scheme in multimedia security. J Image Video Proc 2020:42. https://doi.org/10.1186/s13640-020-00529-z

    Article  Google Scholar 

  19. Na W, Junsong F, Jiwen Z, Bharat KB (2018) Source-location privacy full protection in wireless sensor networks. Inf Sci 444:105–121. https://doi.org/10.1016/j.ins.2018.02.064

    Article  MathSciNet  Google Scholar 

  20. Naor M, Shamir A (1995) Visual cryptography. In: De Santis A (ed) Advances in cryptology-EUROCRYPT'94, Lecture notes in computer science, vol 950. Springer, Berlin, pp 1–2. https://doi.org/10.1007/BFb0053419

    Chapter  Google Scholar 

  21. Phiri KK, Ali P, Eneya L, Kim H (2018) Linear (t, n) secret sharing scheme based on single polynomial. Int J Appl Eng Res 13:11600–11605

    Google Scholar 

  22. Prashanti G, Nirupama BM (2020) Polynomial-based secret sharing scheme for text, image and audio. J Inst Eng (India): B 101:609–621. https://doi.org/10.1007/s40031-020-00475-4

    Article  Google Scholar 

  23. Rong Z, Jian JZ, Fang D, Feng QZ (2009) A new image secret sharing scheme to identify cheaters. Comput Stand Interfaces 31:252–257. https://doi.org/10.1016/j.csi.2007.10.012

    Article  Google Scholar 

  24. Shamir A (1979) How to share a secret. Commun ACM 22:612–613. https://doi.org/10.1145/359168.359176

    Article  MathSciNet  Google Scholar 

  25. Shivendra S, Shailendra T, Krishn KM, Zhigao Z, Arun KS (2018) Providing security and privacy to huge and vulnerable songs repository using visual cryptography. Multimed Tools Appl 77:11101–11120. https://doi.org/10.1007/s11042-017-5240-6

    Article  Google Scholar 

  26. Shyamalendu K, Bibhas CD (2020) A verifiable secret sharing scheme with combiner verification and cheater identification. J Inf Secur Appl 51:102430. https://doi.org/10.1016/j.jisa.2019.102430

    Article  Google Scholar 

  27. Thien CC, Lin JC (2002) Secret image sharing. Comput Graph 26:765–770. https://doi.org/10.1016/S0097-8493(02)00131-0

    Article  Google Scholar 

  28. Wang R, Shyu S (2007) Scalable secret image sharing. Signal Process Image Commun 22:363–373. https://doi.org/10.1016/j.image.2006.12.012

    Article  Google Scholar 

  29. Xingxing J, Daoshun W, Daxin N, Xiangyang L, Jonathan ZS (2019) A new threshold changeable secret sharing scheme based on the Chinese remainder theorem. Inf Sci 473:13–30. https://doi.org/10.1016/j.ins.2018.09.024

    Article  MathSciNet  Google Scholar 

  30. Yang C, Huang S (2010) Constructions and properties of k out of n scalable secret image sharing. Opt Commun 283:1750–1762. https://doi.org/10.1016/j.optcom.2009.12.077

    Article  Google Scholar 

  31. Yang CN, Chen TS, Yu KH, Wang CC (2007) Improvements of image sharing with steganography and authentication. J Syst Softw 80:1070–1076. https://doi.org/10.1016/j.jss.2006.11.022

    Article  Google Scholar 

  32. Yvo D, Shuang H, Jean JQ (1998) Audio and optical cryptography. Springer-Verlag Berlin Heidelberg 1514, pp 392–404

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guttikonda Prashanti.

Ethics declarations

Conflicts of interest/competing interests

The authors declare they have no conflicts / competing interests.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Prashanti, G., Bhat, M.N. Cheating identifiable polynomial based secret sharing scheme for audio and image. Multimed Tools Appl 83, 403–423 (2024). https://doi.org/10.1007/s11042-023-15625-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-15625-1

Keywords

Navigation