Abstract
In 2017, Singh et al. constructed a secure cloud-based (2, 2) secret image sharing with the capability of tampering detection using (r, n) Permutation Ordered Binary (POB) number system. This scheme can solve the problem of secure storage of image-shares at cloud servers, and is also capable of authenticating image-shares at pixel level. However, Singh et al.’s scheme assumes that participants already know the parameters r in (r, n) POB, on which they can recover each image pixel efficiently. In fact, the distribution of parameters r is not that easy as described in their scheme, it needs secure channels and the storage of r is almost same as the share. In Singh et al.’s scheme, the authors did not show how to share the information of r among participants. In this paper, we proposed a new secret image sharing using (r, n) POB number system which is extended from Singh et al.’s framework. In our scheme, the parameters r for all image pixels are identical and are publicly published. Thus, the problem of Singh et al.’s scheme is solved. In addition, our scheme can also authenticate tampered shares at pixel level.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Thien, C.C., Lin, J.C.: Secret image sharing. Comput. Graph. 26, 765–770 (2002)
Yang, C.N., Chu, Y.Y.: A general \((k, n)\) scalable secret image sharing scheme with the smooth scalability. J. Syst. Softw. 84(10), 1726–1733 (2011)
Liu, Y.X., Yang, C.N.: Scalable secret image sharing scheme with essential shadows. Sig. Process. Image Commun. 58, 49–55 (2017)
Wang, R.Z.: Region incrementing visual cryptography. IEEE Signal Process. Lett. 16(8), 659–662 (2009)
Yang, C.N., Shih, H.W., Wu, C.C., Harn, L.: \(k\) out of \(n\) region incrementing scheme in visual cryptography. IEEE Trans. Circuits Syst. Video Technol. 22(5), 799–809 (2012)
Yang, C.N., Chen, T.S.: Extended visual secret sharing schemes: improving the shadow image quality. Int. J. Pattern Recognit. Artif. Intell. 21, 879–898 (2007)
Chen, T.H., Wu, C.S.: Efficient multi-secret image sharing based on Boolean-operations. Sig. Process. 91(1), 90–97 (2011)
Liu, Y.X., Yang, C.N., Wu, S.Y., Chou, Y.S.: Progressive \((k, n)\) secret image sharing schemes based on Boolean operations and covering codes. Sig. Process. Image Commun. 66, 77–86 (2018)
Liu, Y.X., Yang, C.N., Chou, Y.S., Wu, S.Y., Sun, Q.D.: Progressive \((k, n)\) secret image sharing scheme with meaningful shadow images by GEMD and RGEMD. J. Vis. Commun. Image Represent. 55, 766–777 (2018)
Sreekumar, A., Sundar, S.B.: An efficient secret sharing scheme for \(n\) out of \(n\) scheme using POB-number system. Int. J. Inf. Process. 3(4), 77–83 (2009)
Deepika, M.P., Sreekumar, A.: A novel secret sharing scheme using POB number system and CRT. Int. J. Appl. Eng. Res. 11(3), 2049–2054 (2016)
Singh, P., Raman, B., Agarwal, N., Atrey, P.K.: Secure cloud-based image tampering detection and localization using POB number system. ACM Trans. Multimedia Comput. Commun. Appl. 13(3), 1–23 (2017)
Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583–592 (2012)
Kuyoro, S.O., Ibikunle, F., Awodele, O.: Cloud computing security issues and challenges. Int. J. Comput. Netw. 3(5), 445–454 (2011)
Mohamed, H., Kianoosh, M.: Authentication schemes for multimedia streams: quantitative analysis and comparison. ACM Trans. Multimedia Comput. Commun. Appl. 6(1), 1–24 (2010)
Sanjay, R., Balasubramanian, R.: A chaotic system based fragile watermarking scheme for image tamper detection. AEU Int. J. Electron. Commun. 65(10), 840–847 (2011)
Bhatnagar, G., Wu, Q.M.J., Atrey, P.K.: Secure randomized image watermarking based on singular value decomposition. ACM Trans. Multimedia Comput. Commun. Appl. 10(1), 1–21 (2013)
Acknowledgement
This work was supported by National Natural Science Foundation of China under Grant No. 61502384, and in part by Ministry of Science and Technology (MOST), under Grant 107-2221-E-259-007.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Liu, YX., Yang, CN. (2020). Enhanced Secret Image Sharing Using POB Number System. In: Yang, CN., Peng, SL., Jain, L. (eds) Security with Intelligent Computing and Big-data Services. SICBS 2018. Advances in Intelligent Systems and Computing, vol 895. Springer, Cham. https://doi.org/10.1007/978-3-030-16946-6_8
Download citation
DOI: https://doi.org/10.1007/978-3-030-16946-6_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-16945-9
Online ISBN: 978-3-030-16946-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)