Advertisement

An Efficient Multi Secret Image Sharing Scheme Using Hill Cipher

  • Mervat Ahmed
  • Hatem S. Abdul-kader
  • Arabi kishk
  • Azza A. AbdoEmail author
Conference paper
  • 69 Downloads
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1153)

Abstract

This paper presents a multi secret sharing scheme using Hill cipher and Blakley secret sharing. The proposed scheme can reconstruct secret images with only k or more of shadow images. It is compared with the scheme proposed by another work, which produced a visual secret sharing scheme for gray scale images with a \( \left( {n,n} \right) \)-threshold. The proposed scheme decreases the threshold to \( \left( {n,n} \right) \) and it’s compared with other work. Besides, the proposed scheme shares more than one secret key using the Hill Cipher algorithm without depending on a random grid as a shared image. Using Hill Cipher and Blakley to share more than secret image increases the security of secret images with lossless image recovery and no pixel expansion. Experimental results demonstrate the efficiency of the scheme.

Keywords

Visual Secret Sharing Hill Cipher Blakley secret sharing 

References

  1. 1.
    Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)MathSciNetCrossRefGoogle Scholar
  2. 2.
    Wu, H.C., Chang, C.C.: Sharing visual multi-secrets using circle shares. Comput. Stand. Interfaces 28, 123–135 (2005)CrossRefGoogle Scholar
  3. 3.
    Shyu, S.J.: Sharing multiple secrets in visual cryptography. Pattern Recogn. 40, 3633–3651 (2007)CrossRefGoogle Scholar
  4. 4.
    Chen, T.-H., Tsao, K.-H., Lee, Y.-S.: Yet another multiple-image encryption by rotating random grids. J. Sig. Process. 92, 2229–2237 (2012)CrossRefGoogle Scholar
  5. 5.
    Chen, T.-H., Wu, C.-S.: Efficient multi-secret image sharing based on boolean operations. J. Sig. Process. 91, 90–97 (2011)CrossRefGoogle Scholar
  6. 6.
    Bunker, S.C., Barasa, M., Ojha, A.: Linear equation based visual secret sharing scheme. In: Advance Computing Conference (IACC), pp. 406–410. IEEE International (2014)Google Scholar
  7. 7.
    Jothi, R., Ojha, A.: On Multi-secret sharing using Hill cipher and random grids. In: International Conference on Advances in Computer Engineering and Applications (2015)Google Scholar
  8. 8.
    Tso, H.-K.: Sharing secret images using Blakley’s concept. Opt. Eng. 47, 077001 (2008)CrossRefGoogle Scholar
  9. 9.
    Chen, W.-K.: Image sharing method for gray-level images. J. Syst. Softw. 86, 581–585 (2013)CrossRefGoogle Scholar
  10. 10.
    Hodeish, M.E., Bukauskas, L., Humbe, V.T.: A new efficient TKHC-based image sharing scheme over unsecured channel.  https://doi.org/10.1016/j.jksuci.2019.08.004

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Mervat Ahmed
    • 1
  • Hatem S. Abdul-kader
    • 1
  • Arabi kishk
    • 1
  • Azza A. Abdo
    • 2
    Email author
  1. 1.Faculty of Computers and InformationMenoufia UniversityShebeen El-KomEgypt
  2. 2.Computer Department, College of Science and HumanitiesImam Abdulrahman Bin Faisal UniversityJubailSaudi Arabia

Personalised recommendations