Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique

Abstract

Secret Image Sharing (SIS) scheme is to encrypt a secret image into ‘n’ specious shadows. It is unable to reveal any data on the secret image if at least one of the shadows is not achieved. In this paper, wavelet-based secret image sharing scheme is proposed with encrypted shadow images using optimal Homomorphic Encryption (HE) technique. Initially, Discrete Wavelet Transform (DWT) is applied on the secret image to produce sub bands. From this process, multiple shadows are created, encrypted and decrypted for each shadow. The encrypted shadow can be recovered just by choosing some subset of these ‘n’ shadows that makes transparent and stack over each other. To improve the shadow security, each shadow is encrypted and decrypted using HE technique. For the concern on image quality, the new Oppositional based Harmony Search (OHS) algorithm was utilized to generate the optimal key. From the analysis, it shows that the proposed scheme provide greater security compared to other existing schemes.

This is a preview of subscription content, access via your institution.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

References

  1. Baghel SS, Goyal A (2016) Improved the security strength of visual cryptography using feature-based watermarking technique. Int J Comput Appl 153(11):9–13

    Google Scholar 

  2. Banik BG, Bandyopadhyay SK (2015) Secret sharing using 3 level DWT method of image steganography based on Lorenz chaotic encryption and visual cryptography. In: Computational Intelligence and Communication Networks (CICN), 2015 International Conference on IEEE, pp 1147–1152

  3. Challa R, Vijayakumar G, Sunny B (2015). Secure image processing using LWE based homomorphic encryption. In: Electrical, Computer and Communication Technologies (ICECCT), 2015 IEEE International Conference on IEEE, pp 1–6

  4. Dardzinska-Glebocka A (2007) Optimization algorithm and data security problem in distributed information systems. In: Signal-image technologies and internet-based system, 2007. SITIS’07. Third International IEEE Conference on IEEE, pp 116–120

  5. Dasgupta S, Pal SK (2016) Design of a polynomial ring based symmetric homomorphic encryption scheme. Perspect Sci 8:692–695

    Article  Google Scholar 

  6. Dayanand IE, Kumar RS (2014) Analysis of secret image sharing using shared image. Int J Comput Appl 108(7):35–39

    Google Scholar 

  7. Dharwadkar NV, Amberker BB (2010) Watermarking scheme for color images using wavelet transform based texture properties and secret sharing. Int J Signal Process 6(2):93–100

    Google Scholar 

  8. Elhoseny M, Yuan X, ElMinir HK, Riad AM (2016a) An energy efficient encryption method for secure dynamic WSN. Secur Commun Netw 9(13):2024–2031

    Google Scholar 

  9. Elhoseny M, Elminir H, Riad A, Yuan X (2016b) A secure data routing schema for WSN using elliptic curve cryptography and homomorphic encryption. J King Saud Univ Comput Inf Sci 28(3):262–275. https://doi.org/10.1016/j.jksuci.2015.11.001

    Article  Google Scholar 

  10. Elhoseny M, Hosny A, Hassanien AE, Muhammad K, AK Sangaiah (2017) Secure automated forensic investigation for sustainable critical infrastructures compliant with green computing requirements. IEEE Trans Sustain Comput:. https://doi.org/10.1109/TSUSC.2017.2782737

    Article  Google Scholar 

  11. Gupta D, Choubey S (2015) The discrete wavelet transforms for image processing. Int J Emerg Technol Adv Eng 4(3):598–602

    Google Scholar 

  12. Houssein EH, Ali MA, Hassanien AE (2016) An image steganography algorithm using haar discrete wavelet transform with advanced encryption system. In: Computer Science and Information Systems (FedCSIS), 2016 Federated Conference on IEEE, pp 641–644

  13. Jiang Q, Chen Z, Li B, Shen J, Yang L, Ma J (2018) Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems. J Ambient Intell Humaniz Comput 9(4):1061–1073. https://doi.org/10.1007/s12652-017-0516-2

    Article  Google Scholar 

  14. Karolin M, Meyyapan DT (2015) RGB based secret sharing scheme in color visual cryptography. Int J Adv Res Comput Commun Eng 4(7):151–155

    Google Scholar 

  15. Kumar C, Singh AK, Kumar P (2018a) Improved wavelet-based image watermarking through SPIHT. Multimed Tools Appl:. https://doi.org/10.1007/s11042-018-6177-0

    Article  Google Scholar 

  16. Kumar C, Singh AK, Kumar P, Singh R, Singh S 2018b SPIHT-based multiple image watermarking in NSCT domain. Concurr Comput Pract Exp. https://doi.org/10.1002/cpe.4912

    Article  Google Scholar 

  17. Kumari S, Karuppiah M, Das AK, Li X, Wu F, Gupta V (2018) Design of a secure anonymity-preserving authentication scheme for session initiation protocol using elliptic curve cryptography. J Ambient Intell Humaniz Comput 9(3):643–653. https://doi.org/10.1007/s12652-017-0460-1

    Article  Google Scholar 

  18. Kuppusamy K, Thamodaran K (2013) Optimized hybrid security mechanism for image authentication and secrecy using PSO. Int J Netw Secur Appl 5(5):115–128

    Google Scholar 

  19. Linju PS, Mathews S (2016) An efficient interception mechanism against cheating in visual cryptography with non pixel expansion of images. Int J Sci Technol Res 5(01):102–106

    Google Scholar 

  20. Liu J, Ke L (2018) New efficient identity based encryption without pairings. J Ambient Intell Humaniz Comput.. https://doi.org/10.1007/s12652-018-0756-9

    Article  Google Scholar 

  21. Mishra DC, Sharma RK (2014) Application of algebra and discrete wavelet transform in two-dimensional data (RGB-images) security. Int J Wavelets Multiresolut Inf Process 12(06):1450040–1450041

    MathSciNet  Article  Google Scholar 

  22. Nagdive MPS, Raut AB (2015) Image visual cryptography by using haar wavelet-based decomposition. Int J Adv Res Comput Eng Technol 4(4):1261–1265

    Google Scholar 

  23. Nazimul Islam Gupta D, Choubey S (2015) Security improvement of image by visual cryptography using super imposed wavelet transform in image processing. Int J Adv Res Comput Sci Softw Eng 5(5):498–503

    Google Scholar 

  24. NouraMetawaa M, KabirHassana, Elhoseny M (2017) Genetic algorithm based model for optimizing bank lending decisions. Expert Syst Appl 80:75–82

    Article  Google Scholar 

  25. Pang CJ (2009) An image encryption algorithm based on discrete wavelet transform and two dimension cat mapping. In: Networks security, wireless communications and trusted computing, 2009. NSWCTC’09. International Conference on (Vol 2, pp 711–714). IEEE

  26. Rani MMS, Mary GG (2016) Enhancement of RGB shares of visual cryptography using PSO. Int J Comput Sci Inf Secur 14(9):938

    Google Scholar 

  27. Reddy GT, Meenakshi N (2014) Extended and embedded visual cryptography. Int J Comput Sci Mob Comput 3(2):235–247

    Google Scholar 

  28. Revathy S (2014) Secure crypto system for image encryption and data embedding using chaos and BB equation algorithm. Int J Comput Sci Mob Comput 3(3):297–306

    Google Scholar 

  29. Sanyasi Naidu P, Kharat R, Tekade R, Mendhe P, Magade V (2016) E-voting system using visual cryptography & secure multi-party computation. In: 2016 International Conference on IEEE Computing Communication Control and automation (ICCUBEA). IEEE, Pune, pp 1–4

  30. Shaheen AM, Sheltami TR, Al-Kharoubi TM, Shakshuki E (2018) Digital image encryption techniques for wireless sensor networks using image transformation methods. DCT and DWT. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-018-0850-z

    Article  Google Scholar 

  31. Shankar K, Eswaran P (2015a) ECC based image encryption scheme with aid of optimization technique using differential evolution algorithm. Int J ApplEng Res 10(55):1841–1845

    Google Scholar 

  32. Shankar K, Eswaran P (2015b) Sharing a secret image with encapsulated shares in visual cryptography. Procedia Comput Sci 70:462–468

    Article  Google Scholar 

  33. Shankar K, Eswaran P (2015c) A secure visual secret share (VSS) creation scheme in visual cryptography using elliptic curve cryptography with optimization technique. Aust J Basic Appl Sci 9(36):150–163

    Google Scholar 

  34. Shankar K, Eswaran P (2016a) RGB-based secure share creation in visual cryptography using optimal elliptic curve cryptography technique. J Circuits Syst Comput 25(11):1650138

    Article  Google Scholar 

  35. Shankar K, Eswaran P (2016b) A new k out of n secret image sharing scheme in visual cryptography. In: 2016 10th International conference on intelligent systems and control (ISCO). IEEE, pp 1–6

  36. Shankar K, Eswaran P (2016c) An efficient image encryption technique based on optimized key generation in ECC using genetic algorithm. In: Artificial intelligence and evolutionary computations in engineering systems. Springer, New Delhi, pp 705–714

    Google Scholar 

  37. Shankar K, Eswaran P (2017) RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography. China Commun 14(2):118–130

    Article  Google Scholar 

  38. Shankar K, Lakshmanaprabu SK (2018) Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm. Int J Eng Technol 7(1.9):22–27

    Article  Google Scholar 

  39. Singh AK, Kumar B, Singh SK, Ghrera SP, Mohan A (2016) Multiple watermarking technique for securing online social network contents using back propagation neural network. Future Gener Comput Syst 86:926–939. https://doi.org/10.1016/j.future.2016.11.023

    Article  Google Scholar 

  40. Singh L, Singh AK, Singh PK (2018) Secure data hiding techniques: a survey. Multimed Tools Appl,. https://doi.org/10.1007/s11042-018-6407-5

    Article  Google Scholar 

  41. Sokouti M, Zakerolhosseini A, Sokouti B (2016) Medical image encryption: an application for improved padding based GGH encryption algorithm. Open Med Inform J 10:11–22

    Article  Google Scholar 

  42. Srivastava R, Kumar B, Singh AK, Mohan A (2018) Computationally efficient joint imperceptible image watermarking and JPEG compression: a green computing approach. Multimed Tools Appl 77(13):16447–16459. https://doi.org/10.1007/s11042-017-5214-8

    Article  Google Scholar 

  43. Talarposhti KM, andJamei MK (2016) A secure image encryption method based on dynamic harmony search (DHS) combined with the chaotic map. Opt Lasers Eng 81:21–34

    Article  Google Scholar 

  44. Thakur S, Singh AK, Ghrera SP, Mohamed Elhoseny (2018a) Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimed Tools Appl:. https://doi.org/10.1007/s11042-018-6263-3

    Article  Google Scholar 

  45. Thakur S, Singh AK, Ghrera SP, Mohan A (2018b) Chaotic based secure watermarking approach for medical images. Multimed Tools Appl:. https://doi.org/10.1007/s11042-018-6691-0

    Article  Google Scholar 

  46. Toughi S, Fathi MH, Sekhavat YA (2017) An image encryption scheme based on elliptic curve pseudo-random and advanced encryption system. Signal Process 141:217–227

    Article  Google Scholar 

  47. Vengadapurvaja AM, Nisha G, Aarthy R, Sasikaladevi N (2017) An efficient homomorphic medical image encryption algorithm for cloud storage security. Procedia Comput Sci 115:643–650

    Article  Google Scholar 

  48. Younes MAB (2016) Literature survey on different techniques of image encryption. J Sci Eng Res 7(1):93–98

    Google Scholar 

  49. Zhang Q, Xu D (2018) Security authentication technology based on dynamic Bayesian network in Internet of Things. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-018-0949-2

    Article  Google Scholar 

  50. Zhang J, Wang B, Xhafa F, Wang XA, Li C (2017) Energy-efficient secure outsourcing decryption of attribute based encryption for mobile device in cloud computation. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-017-0658-2

    Article  Google Scholar 

Download references

Author information

Affiliations

Authors

Corresponding author

Correspondence to Mohamed Elhoseny.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Shankar, K., Elhoseny, M., Kumar, R.S. et al. Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. J Ambient Intell Human Comput 11, 1821–1833 (2020). https://doi.org/10.1007/s12652-018-1161-0

Download citation

Keywords

  • Secret image sharing
  • Shadow
  • Homomorphic encryption
  • Discrete wavelet transform
  • Harmony search (OHS) algorithm
  • PSNR