Abstract
A multi-secret image sharing (MSIS) scheme facilitates the secure distribution of multiple images among a group of participants. Several MSIS schemes have been proposed with a (n, n) structure that encodes secret input images into n share images. This encoding ensures that if a subset of participants collude, no information about the secret images can be revealed. The secret images can only be recovered if all participants cooperate. Most of these schemes are built using basic Boolean operations, primarily XOR operations. MSIS schemes that rely on Boolean logic offer various benefits compared to other methods, such as the ability to recover data without any loss, no increase in pixel size, and efficient computation. This article presents a verifiable MSIS scheme that relies on a secure two-variable one-way function and a secure hash function. The scheme allows for independent verification of both the dealer and the participants to detect any cheating attempts. The proposed scheme utilizes the Deoxyribonucleic acid (DNA) encryption technique to leverage the inherent benefits of DNA computing, such as enhanced security, fast computation, minimal storage needs, and low power usage. The share images produced by the proposed scheme exhibit an average entropy of 7.99, indicating that the generated 8-bit share images are completely random. Additionally, the correlation coefficient is approximately 0.005, suggesting that neighboring pixels in the images are not related to each other. The proposed scheme can detect any instance of cheating, whether it is done by the dealer or by a participant.
Similar content being viewed by others
Data Availability
The research does not have any dataset to declare.
References
Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography. Ph.D. thesis, University of Buckingham
Adhikari A (2014) Linear algebraic techniques to construct monochrome visual cryptographic schemes for general access structure and its applications to color images. Des, Codes Cryptogr 73(3):865–895
Adleman LM (1994) Molecular computation of solutions to combinatorial problems. Sci 266(5187):1021–1024
Beaver D (1994) Factoring: the DNA solution. In: International Conference on the Theory and Application of Cryptology. Springer, pp 419–423
Blakley GR (1979) Safeguarding cryptographic keys. In: 1979 International workshop on managing requirements knowledge (MARK). IEEE, pp 313–318
Boneh D, Dunworth C, Lipton RJ (1995) Breaking DES using a molecular computer. DNA Based Comput 27:37–66
Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations. Opt Lasers in Eng 88:197–213
Chang CC, Lin CC, Lin CH, Chen YH (2008) A novel secret image sharing scheme in color images using small shadow images. Inf Sci 178(11):2433–2447
Chattopadhyay AK, Ghosh D, Maitra P, Nag A, Saha HN (2018) A verifiable (n, n) secret image sharing scheme using XOR operations. In: 2018 9th IEEE Annual ubiquitous computing, electronics & mobile communication conference (UEMCON). IEEE, pp 1025–1031
Chattopadhyay AK, Nag A, Singh JP (2021) An efficient verifiable (t, n)-threshold secret image sharing scheme with ultralight shares. Multimedia Tools Appl 1–31
Chattopadhyay AK, Nag A, Singh JP, Singh AK (2020) A verifiable multi-secret image sharing scheme using XOR operation and hash function. Multimedia Tools Appl 1–30
Chattopadhyay AK, Saha S, Nag A, Nandi S (2024) Secret sharing: A comprehensive survey, taxonomy and applications. Comput Sci Rev 51:100608
Chen CC, Wu WJ (2014) A secure boolean-based multi-secret image sharing scheme. J Syst Softw 92:107–114
Chen SK et al (2007) A visual cryptography based system for sharing multiple secret images. ISCGAV 7:117–122
Chen TH, Tsao KH, Lee YS (2012) Yet another multiple-image encryption by rotating random grids. Signal Process 92(9):2229–2237
Chen TH, Wu CS (2011) Efficient multi-secret image sharing based on boolean operations. Signal Process 91(1):90–97
Cimato S, De Prisco R, De Santis A (2007) Colored visual cryptography without color darkening. Theor Comput Sci 374(1–3):261–276
Dutta S, Adhikari A, Ruj S (2019) Maximal contrast color visual secret sharing schemes. Des, Codes Cryptogr 87(7):1699–1711
Enayatifar R, Abdullah AH, Isnin IF (2014) Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt Lasers Eng 56:83–93
Eswaran P, Shankar K (2017) Multi secret image sharing scheme based on DNA cryptography with XOR. Int J Pure Appl Math 118(7):393–398
Faraoun KM (2017) Design of a new efficient and secure multi-secret images sharing scheme. Multimedia Tools Appl 76(5):6247–6261
Ghebleh M, Kanso A (2018) A novel secret image sharing scheme using large primes. Multimedia Tools Appl 77(10):11903–11923
Guo C, Chang CC, Wang ZH (2012) A new data hiding scheme based on DNA sequence. Int J Innov Comput Inf Control 8(1):139–149
Jain S, Bhatnagar V (2014) A novel DNA sequence dictionary method for securing data in DNA using spiral approach and framework of DNA cryptography. In: 2014 International conference on advances in engineering & technology research (ICAETR-2014). IEEE, pp 1–5
Kanso A, Ghebleh M (2017) An efficient (t, n)-threshold secret image sharing scheme. Multimedia Tools Appl 76(15):16369–16388
Lin CC, Tsai WH et al (2003) Secret image sharing with capability of share data reduction. Opt Eng 42(8):2340–2345
Liu CL, Tsai WJ, Chang TY, Peng CC, Wong PS (2015) Meaningful share generation for (2, 2)-multiple visual secret sharing scheme without pixel expansion. The Comput J 58(7):1598–1606
Liu L, Zhang Q, Wei X (2012) A rgb image encryption algorithm based on DNA encoding and chaos map. Comput Electr Eng 38(5):1240–1248
Mishra A, Gupta A (2018) Multi secret sharing scheme using iterative method. J Inf Optimization Sci 39(3):631–641
Mousa H, Moustafa K, Abdel-Wahed W, Hadhoud MM (2011) Data hiding based on contrast mapping using DNA medium. Int Arab J Inf Technol 8(2):147–154
Nag A, Singh JP, Singh AK (2019) An efficient boolean based multi-secret image sharing scheme. Multimedia Tools Appl 1–25
Naor M, Shamir A (1994) Visual cryptography. the workshop on the theory and application of of cryptographic techniques. Springer, pp 1–12
Pelletier O, Weimerskirch A (2002) Algorithmic self-assembly of DNA tiles and its application to cryptanalysis. In: Genetic and evolutionary computation conference. Morgan Kauffman, USA
Ravichandran D, Banu SA, Murthy B, Balasubramanian V, Fathima S, Amirtharajan R et al (2021) An efficient medical image encryption using hybrid DNA computing and chaos in transform domain. Med Biol Eng Comput 59(3):589–605
Saha S, Chattopadhyay AK, Barman AK, Nag A, Nandi S (2023) Secret image sharing schemes: A comprehensive survey. IEEE Access
Sardar MK, Adhikari A (2020) A new lossless secret color image sharing scheme with small shadow size. J Vis Commun Image Represent 102768
Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613
Shiu HJ, Ng KL, Fang JF, Lee RC, Huang CH (2010) Data hiding methods based upon DNA sequences. Inf Sci 180(11):2196–2208
Shyu SJ, Chen K (2011) Visual multiple secret sharing based upon turning and flipping. Inf Sci 181(15):3246–3266
Shyu SJ, Chen MC (2011) Optimum pixel expansions for threshold visual secret sharing schemes. IEEE Trans Inf Forensic Secur 6(3):960–969
Thien CC, Lin JC (2002) Secret image sharing. Comput Graph 26(5):765–770
Wang D, Zhang L, Ma N, Li X (2007) Two secret sharing schemes based on boolean operations. Pattern Recognit 40(10):2776–2785
Wang RZ, Su CH (2006) Secret image sharing with smaller shadow images. Pattern Recognit Lett 27(6):551–555
Wang XY, Zhang YQ, Bao XM (2015) A novel chaotic image encryption scheme using DNA sequence operations. Opt Lasers Eng 73:53–61
Wang Y, Han Q, Cui G, Sun J (2019) Hiding messages based on DNA sequence and recombinant DNA technique. IEEE Trans Nanotechnol 18:299–307
Wu KS (2013) A secret image sharing scheme for light images. EURASIP J Adv Signal Process 2013(1):49
Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber J: Multidiscip J Sci Technol, J Sel Areas Telecommun (JSAT) 1(2):31–38
Yang CN, Chen CH, Cai SR (2016) Enhanced Boolean-based multi secret image sharing scheme. J Syst Softw 116:22–34
Yeh KH (2016) A secure IoT-based healthcare system with body sensor networks. IEEE Access 4:10288–10299
Zhang YQ, Wang XY, Liu J, Chi ZL (2016) An image encryption scheme based on the MLNCML system using DNA sequences. Opt Lasers Eng 82:95–103
Zhu S, Zhu C (2020) Secure image encryption algorithm based on hyperchaos and dynamic DNA coding. Entropy 22(7):772
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interest
The authors do not have any conflict of interest to declare.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Chattopadhyay, A.K., Saha, S., Nag, A. et al. A verifiable multi-secret image sharing scheme based on DNA encryption. Multimed Tools Appl (2024). https://doi.org/10.1007/s11042-024-19033-x
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11042-024-19033-x