Skip to main content
Log in

A verifiable multi-secret image sharing scheme based on DNA encryption

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

A multi-secret image sharing (MSIS) scheme facilitates the secure distribution of multiple images among a group of participants. Several MSIS schemes have been proposed with a (nn) structure that encodes secret input images into n share images. This encoding ensures that if a subset of participants collude, no information about the secret images can be revealed. The secret images can only be recovered if all participants cooperate. Most of these schemes are built using basic Boolean operations, primarily XOR operations. MSIS schemes that rely on Boolean logic offer various benefits compared to other methods, such as the ability to recover data without any loss, no increase in pixel size, and efficient computation. This article presents a verifiable MSIS scheme that relies on a secure two-variable one-way function and a secure hash function. The scheme allows for independent verification of both the dealer and the participants to detect any cheating attempts. The proposed scheme utilizes the Deoxyribonucleic acid (DNA) encryption technique to leverage the inherent benefits of DNA computing, such as enhanced security, fast computation, minimal storage needs, and low power usage. The share images produced by the proposed scheme exhibit an average entropy of 7.99, indicating that the generated 8-bit share images are completely random. Additionally, the correlation coefficient is approximately 0.005, suggesting that neighboring pixels in the images are not related to each other. The proposed scheme can detect any instance of cheating, whether it is done by the dealer or by a participant.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

Data Availability

The research does not have any dataset to declare.

References

  1. Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography. Ph.D. thesis, University of Buckingham

  2. Adhikari A (2014) Linear algebraic techniques to construct monochrome visual cryptographic schemes for general access structure and its applications to color images. Des, Codes Cryptogr 73(3):865–895

    Article  MathSciNet  Google Scholar 

  3. Adleman LM (1994) Molecular computation of solutions to combinatorial problems. Sci 266(5187):1021–1024

    Article  Google Scholar 

  4. Beaver D (1994) Factoring: the DNA solution. In: International Conference on the Theory and Application of Cryptology. Springer, pp 419–423

  5. Blakley GR (1979) Safeguarding cryptographic keys. In: 1979 International workshop on managing requirements knowledge (MARK). IEEE, pp 313–318

  6. Boneh D, Dunworth C, Lipton RJ (1995) Breaking DES using a molecular computer. DNA Based Comput 27:37–66

    Article  MathSciNet  Google Scholar 

  7. Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations. Opt Lasers in Eng 88:197–213

    Article  Google Scholar 

  8. Chang CC, Lin CC, Lin CH, Chen YH (2008) A novel secret image sharing scheme in color images using small shadow images. Inf Sci 178(11):2433–2447

    Article  Google Scholar 

  9. Chattopadhyay AK, Ghosh D, Maitra P, Nag A, Saha HN (2018) A verifiable (n, n) secret image sharing scheme using XOR operations. In: 2018 9th IEEE Annual ubiquitous computing, electronics & mobile communication conference (UEMCON). IEEE, pp 1025–1031

  10. Chattopadhyay AK, Nag A, Singh JP (2021) An efficient verifiable (t, n)-threshold secret image sharing scheme with ultralight shares. Multimedia Tools Appl 1–31

  11. Chattopadhyay AK, Nag A, Singh JP, Singh AK (2020) A verifiable multi-secret image sharing scheme using XOR operation and hash function. Multimedia Tools Appl 1–30

  12. Chattopadhyay AK, Saha S, Nag A, Nandi S (2024) Secret sharing: A comprehensive survey, taxonomy and applications. Comput Sci Rev 51:100608

    Article  MathSciNet  Google Scholar 

  13. Chen CC, Wu WJ (2014) A secure boolean-based multi-secret image sharing scheme. J Syst Softw 92:107–114

    Article  Google Scholar 

  14. Chen SK et al (2007) A visual cryptography based system for sharing multiple secret images. ISCGAV 7:117–122

    Google Scholar 

  15. Chen TH, Tsao KH, Lee YS (2012) Yet another multiple-image encryption by rotating random grids. Signal Process 92(9):2229–2237

    Article  Google Scholar 

  16. Chen TH, Wu CS (2011) Efficient multi-secret image sharing based on boolean operations. Signal Process 91(1):90–97

    Article  Google Scholar 

  17. Cimato S, De Prisco R, De Santis A (2007) Colored visual cryptography without color darkening. Theor Comput Sci 374(1–3):261–276

    Article  MathSciNet  Google Scholar 

  18. Dutta S, Adhikari A, Ruj S (2019) Maximal contrast color visual secret sharing schemes. Des, Codes Cryptogr 87(7):1699–1711

    Article  MathSciNet  Google Scholar 

  19. Enayatifar R, Abdullah AH, Isnin IF (2014) Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt Lasers Eng 56:83–93

  20. Eswaran P, Shankar K (2017) Multi secret image sharing scheme based on DNA cryptography with XOR. Int J Pure Appl Math 118(7):393–398

    Google Scholar 

  21. Faraoun KM (2017) Design of a new efficient and secure multi-secret images sharing scheme. Multimedia Tools Appl 76(5):6247–6261

    Article  Google Scholar 

  22. Ghebleh M, Kanso A (2018) A novel secret image sharing scheme using large primes. Multimedia Tools Appl 77(10):11903–11923

    Article  Google Scholar 

  23. Guo C, Chang CC, Wang ZH (2012) A new data hiding scheme based on DNA sequence. Int J Innov Comput Inf Control 8(1):139–149

    Google Scholar 

  24. Jain S, Bhatnagar V (2014) A novel DNA sequence dictionary method for securing data in DNA using spiral approach and framework of DNA cryptography. In: 2014 International conference on advances in engineering & technology research (ICAETR-2014). IEEE, pp 1–5

  25. Kanso A, Ghebleh M (2017) An efficient (t, n)-threshold secret image sharing scheme. Multimedia Tools Appl 76(15):16369–16388

    Article  Google Scholar 

  26. Lin CC, Tsai WH et al (2003) Secret image sharing with capability of share data reduction. Opt Eng 42(8):2340–2345

    Article  Google Scholar 

  27. Liu CL, Tsai WJ, Chang TY, Peng CC, Wong PS (2015) Meaningful share generation for (2, 2)-multiple visual secret sharing scheme without pixel expansion. The Comput J 58(7):1598–1606

    Article  Google Scholar 

  28. Liu L, Zhang Q, Wei X (2012) A rgb image encryption algorithm based on DNA encoding and chaos map. Comput Electr Eng 38(5):1240–1248

    Article  Google Scholar 

  29. Mishra A, Gupta A (2018) Multi secret sharing scheme using iterative method. J Inf Optimization Sci 39(3):631–641

    Article  MathSciNet  Google Scholar 

  30. Mousa H, Moustafa K, Abdel-Wahed W, Hadhoud MM (2011) Data hiding based on contrast mapping using DNA medium. Int Arab J Inf Technol 8(2):147–154

    Google Scholar 

  31. Nag A, Singh JP, Singh AK (2019) An efficient boolean based multi-secret image sharing scheme. Multimedia Tools Appl 1–25

  32. Naor M, Shamir A (1994) Visual cryptography. the workshop on the theory and application of of cryptographic techniques. Springer, pp 1–12

  33. Pelletier O, Weimerskirch A (2002) Algorithmic self-assembly of DNA tiles and its application to cryptanalysis. In: Genetic and evolutionary computation conference. Morgan Kauffman, USA

  34. Ravichandran D, Banu SA, Murthy B, Balasubramanian V, Fathima S, Amirtharajan R et al (2021) An efficient medical image encryption using hybrid DNA computing and chaos in transform domain. Med Biol Eng Comput 59(3):589–605

    Article  Google Scholar 

  35. Saha S, Chattopadhyay AK, Barman AK, Nag A, Nandi S (2023) Secret image sharing schemes: A comprehensive survey. IEEE Access

  36. Sardar MK, Adhikari A (2020) A new lossless secret color image sharing scheme with small shadow size. J Vis Commun Image Represent 102768

  37. Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613

    Article  MathSciNet  Google Scholar 

  38. Shiu HJ, Ng KL, Fang JF, Lee RC, Huang CH (2010) Data hiding methods based upon DNA sequences. Inf Sci 180(11):2196–2208

    Article  MathSciNet  Google Scholar 

  39. Shyu SJ, Chen K (2011) Visual multiple secret sharing based upon turning and flipping. Inf Sci 181(15):3246–3266

    Article  MathSciNet  Google Scholar 

  40. Shyu SJ, Chen MC (2011) Optimum pixel expansions for threshold visual secret sharing schemes. IEEE Trans Inf Forensic Secur 6(3):960–969

    Article  Google Scholar 

  41. Thien CC, Lin JC (2002) Secret image sharing. Comput Graph 26(5):765–770

    Article  Google Scholar 

  42. Wang D, Zhang L, Ma N, Li X (2007) Two secret sharing schemes based on boolean operations. Pattern Recognit 40(10):2776–2785

    Article  Google Scholar 

  43. Wang RZ, Su CH (2006) Secret image sharing with smaller shadow images. Pattern Recognit Lett 27(6):551–555

    Article  Google Scholar 

  44. Wang XY, Zhang YQ, Bao XM (2015) A novel chaotic image encryption scheme using DNA sequence operations. Opt Lasers Eng 73:53–61

    Article  Google Scholar 

  45. Wang Y, Han Q, Cui G, Sun J (2019) Hiding messages based on DNA sequence and recombinant DNA technique. IEEE Trans Nanotechnol 18:299–307

    Article  Google Scholar 

  46. Wu KS (2013) A secret image sharing scheme for light images. EURASIP J Adv Signal Process 2013(1):49

    Article  Google Scholar 

  47. Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber J: Multidiscip J Sci Technol, J Sel Areas Telecommun (JSAT) 1(2):31–38

  48. Yang CN, Chen CH, Cai SR (2016) Enhanced Boolean-based multi secret image sharing scheme. J Syst Softw 116:22–34

    Article  Google Scholar 

  49. Yeh KH (2016) A secure IoT-based healthcare system with body sensor networks. IEEE Access 4:10288–10299

    Article  Google Scholar 

  50. Zhang YQ, Wang XY, Liu J, Chi ZL (2016) An image encryption scheme based on the MLNCML system using DNA sequences. Opt Lasers Eng 82:95–103

    Article  Google Scholar 

  51. Zhu S, Zhu C (2020) Secure image encryption algorithm based on hyperchaos and dynamic DNA coding. Entropy 22(7):772

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jyoti Prakash Singh.

Ethics declarations

Conflict of Interest

The authors do not have any conflict of interest to declare.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chattopadhyay, A.K., Saha, S., Nag, A. et al. A verifiable multi-secret image sharing scheme based on DNA encryption. Multimed Tools Appl (2024). https://doi.org/10.1007/s11042-024-19033-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11042-024-19033-x

Keywords

Navigation