Skip to main content

Enhanced Secret Image Sharing Using POB Number System

  • Conference paper
  • First Online:
Security with Intelligent Computing and Big-data Services (SICBS 2018)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 895))

  • 1096 Accesses

Abstract

In 2017, Singh et al. constructed a secure cloud-based (2, 2) secret image sharing with the capability of tampering detection using (rn) Permutation Ordered Binary (POB) number system. This scheme can solve the problem of secure storage of image-shares at cloud servers, and is also capable of authenticating image-shares at pixel level. However, Singh et al.’s scheme assumes that participants already know the parameters r in (rn) POB, on which they can recover each image pixel efficiently. In fact, the distribution of parameters r is not that easy as described in their scheme, it needs secure channels and the storage of r is almost same as the share. In Singh et al.’s scheme, the authors did not show how to share the information of r among participants. In this paper, we proposed a new secret image sharing using (rn) POB number system which is extended from Singh et al.’s framework. In our scheme, the parameters r for all image pixels are identical and are publicly published. Thus, the problem of Singh et al.’s scheme is solved. In addition, our scheme can also authenticate tampered shares at pixel level.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Thien, C.C., Lin, J.C.: Secret image sharing. Comput. Graph. 26, 765–770 (2002)

    Article  Google Scholar 

  2. Yang, C.N., Chu, Y.Y.: A general \((k, n)\) scalable secret image sharing scheme with the smooth scalability. J. Syst. Softw. 84(10), 1726–1733 (2011)

    Article  Google Scholar 

  3. Liu, Y.X., Yang, C.N.: Scalable secret image sharing scheme with essential shadows. Sig. Process. Image Commun. 58, 49–55 (2017)

    Article  Google Scholar 

  4. Wang, R.Z.: Region incrementing visual cryptography. IEEE Signal Process. Lett. 16(8), 659–662 (2009)

    Article  Google Scholar 

  5. Yang, C.N., Shih, H.W., Wu, C.C., Harn, L.: \(k\) out of \(n\) region incrementing scheme in visual cryptography. IEEE Trans. Circuits Syst. Video Technol. 22(5), 799–809 (2012)

    Article  Google Scholar 

  6. Yang, C.N., Chen, T.S.: Extended visual secret sharing schemes: improving the shadow image quality. Int. J. Pattern Recognit. Artif. Intell. 21, 879–898 (2007)

    Article  Google Scholar 

  7. Chen, T.H., Wu, C.S.: Efficient multi-secret image sharing based on Boolean-operations. Sig. Process. 91(1), 90–97 (2011)

    Article  Google Scholar 

  8. Liu, Y.X., Yang, C.N., Wu, S.Y., Chou, Y.S.: Progressive \((k, n)\) secret image sharing schemes based on Boolean operations and covering codes. Sig. Process. Image Commun. 66, 77–86 (2018)

    Article  Google Scholar 

  9. Liu, Y.X., Yang, C.N., Chou, Y.S., Wu, S.Y., Sun, Q.D.: Progressive \((k, n)\) secret image sharing scheme with meaningful shadow images by GEMD and RGEMD. J. Vis. Commun. Image Represent. 55, 766–777 (2018)

    Article  Google Scholar 

  10. Sreekumar, A., Sundar, S.B.: An efficient secret sharing scheme for \(n\) out of \(n\) scheme using POB-number system. Int. J. Inf. Process. 3(4), 77–83 (2009)

    Google Scholar 

  11. Deepika, M.P., Sreekumar, A.: A novel secret sharing scheme using POB number system and CRT. Int. J. Appl. Eng. Res. 11(3), 2049–2054 (2016)

    Google Scholar 

  12. Singh, P., Raman, B., Agarwal, N., Atrey, P.K.: Secure cloud-based image tampering detection and localization using POB number system. ACM Trans. Multimedia Comput. Commun. Appl. 13(3), 1–23 (2017)

    Article  Google Scholar 

  13. Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583–592 (2012)

    Article  Google Scholar 

  14. Kuyoro, S.O., Ibikunle, F., Awodele, O.: Cloud computing security issues and challenges. Int. J. Comput. Netw. 3(5), 445–454 (2011)

    Google Scholar 

  15. Mohamed, H., Kianoosh, M.: Authentication schemes for multimedia streams: quantitative analysis and comparison. ACM Trans. Multimedia Comput. Commun. Appl. 6(1), 1–24 (2010)

    Google Scholar 

  16. Sanjay, R., Balasubramanian, R.: A chaotic system based fragile watermarking scheme for image tamper detection. AEU Int. J. Electron. Commun. 65(10), 840–847 (2011)

    Article  Google Scholar 

  17. Bhatnagar, G., Wu, Q.M.J., Atrey, P.K.: Secure randomized image watermarking based on singular value decomposition. ACM Trans. Multimedia Comput. Commun. Appl. 10(1), 1–21 (2013)

    Article  Google Scholar 

Download references

Acknowledgement

This work was supported by National Natural Science Foundation of China under Grant No. 61502384, and in part by Ministry of Science and Technology (MOST), under Grant 107-2221-E-259-007.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yan-Xiao Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liu, YX., Yang, CN. (2020). Enhanced Secret Image Sharing Using POB Number System. In: Yang, CN., Peng, SL., Jain, L. (eds) Security with Intelligent Computing and Big-data Services. SICBS 2018. Advances in Intelligent Systems and Computing, vol 895. Springer, Cham. https://doi.org/10.1007/978-3-030-16946-6_8

Download citation

Publish with us

Policies and ethics