Abstract
In the recent years, the researchers have proposed several schemes for sharing multiple secret images using less number of shares through different operations in order to save storage memory and network bandwidth consumption. However, the existing schemes suffer from one or more of the following limitations, viz. no verification of reconstructed secret images, no support for resistance against loss of single share, support for sharing only 2 secret images, incompatibility for sharing single secret image, lossy reconstruction of secret images and no support for sharing all types (binary, grayscale and color) of images. The proposed scheme overcomes these existing limitations, and shares \(u-1\) secret images in \(v\) (\(v\ge 2\)) shares out of which at least \(u\) (\(2 \le u\le v\)) shares are required to reconstruct all \(u-1\) secret images. The operations are performed in galois field \( GF(2^{8}) \) during shares generation and secret images reconstruction. The verification of the reconstructed secret images is done by using a random authentication image. The theoretical analysis, comparison and experimental results are provided to indicate the validity, merits and implementability of the proposed scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ahmed, M., Abdul-kader, H.S., kishk, A., Abdo, A.A.: An efficient multi secret image sharing scheme using hill cipher. In: Hassanien, A.-E., Azar, A.T., Gaber, T., Oliva, D., Tolba, F.M. (eds.) AICV 2020. AISC, vol. 1153, pp. 604–613. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-44289-7_57
Azza, A.A., Lian, S.: Multi-secret image sharing based on elementary cellular automata with steganography. Multimedia Tools Appl. 79, 21241–21264 (2020)
Bhat, K., Uday Kumar Reddy, K.R., Ranjan Kumar, H.S., Mahto, D.: A novel scheme for lossless authenticated multiple secret images sharing using polynomials and extended visual cryptography. IET Inf. Secur. 15(1), 13–22 (2021)
Bhosale, A.G., Patil, V.S.: A (2, 2) visual cryptography technique to share two secrets. In: 2020 International Conference on Inventive Computation Technologies (ICICT), pp. 563–569 (2020). https://doi.org/10.1109/ICICT48043.2020.9112420
Chang, J.J.Y., Huang, B.Y., Juan, J.S.T.: A new visual multi-secrets sharing scheme by random grids. Cryptography 2(3) (2018). https://doi.org/10.3390/cryptography2030024
Chanu, O.B., Neelima, A.: A new multi-secret image sharing scheme based on DCT. Vis. Comput. 36, 939–950 (2020)
Chattopadhyay, A.K., Nag, A., Singh, J.P., Singh, A.K.: A verifiable multi-secret image sharing scheme using XOR operation and hash function. Multimedia Tools Appl. (2020). https://doi.org/10.1007/s11042-020-09174-0
Chen, C.C., Chen, J.L.: A new Boolean-based multiple secret image sharing scheme to share different sized secret images. J. Inf. Secur. Appl. 33, 45–54 (2017)
Deshmukha, M., Nainb, N., Ahmed, M.: A novel approach for sharing multiple color images by employing Chinese remainder theorem. J. Vis. Commun. Image Represent. 49, 291–302 (2017)
Huang, B.Y., Juan, J.S.T.: Flexible meaningful visual multi-secret sharing scheme by random grids. Multimedia Tools Appl. 79, 7705–7729 (2020)
Kabirirad, S., Eslami, Z.: A (t, n)-multi secret image sharing scheme based on Boolean operations. J. Vis. Commun. Image Represent. 57, 39–47 (2018)
Kabirirad, S., Eslami, Z.: Improvement of (n, n)-multi-secret image sharing schemes based on Boolean operations. J. Inf. Secur. Appl. 47, 16–27 (2019)
Kapadiya, V.J., Desai, L.S., Meghrajani, Y.K.: Boolean-based multi secret sharing scheme using meaningful shares. In: 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT), pp. 840–844 (2018). https://doi.org/10.1109/ICICCT.2018.8473323
Shankar, K., Devika, G., Ilayaraja, M.: Scheme based on Boolean operations and elliptic curve cryptography. Int. J. Pure Appl. Math. 116(10), 293–300 (2017)
Mary, I.R.P., Eswaran, P., Shankar, K.: Multi secret image sharing scheme based on DNA cryptography with XOR. Int. J. Pure Appl. Math. 118(7), 393–398 (2018)
Matsumoto, M., Nishimura, T.: Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator. ACM Trans. Model. Comput. Simul. 8(1), 3–30 (1998)
Meghrajani, Y.K., Desai, L.S., Mazumdar, H.S.: Secure and efficient arithmetic-based multi-secret image sharing scheme using universal share. J. Inf. Secur. Appl. 47, 267–274 (2019)
Mishra, A., Gupta, A.: Multi secret sharing scheme using iterative method. J. Inf. Optim. Sci. 39(3), 631–641 (2018)
Mishra, K., Kavala, S., Singh, S.K., Nagabhushan, P.: Efficient collusion resistant multi-secret image sharing. Multimedia Tools Appl. 79, 33233–33252 (2020)
Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995). https://doi.org/10.1007/BFb0053419
Nitharwal, S.M., Verma, H.K.: A Boolean-based multi-secret image sharing scheme using bit-reversal. In: 2017 International Conference on Intelligent Communication and Computational Techniques (ICCT), pp. 114–118 (2017). https://doi.org/10.1109/INTELCCT.2017.8324030
Prasetyo, H., Guo, J.: A note on multiple secret sharing using Chinese remainder theorem and exclusive-or. IEEE Access 7, 37473–37497 (2019)
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
Shivani, S.: Multi secret sharing with unexpanded meaningful shares. Multimedia Tools Appl. 77, 6287–6310 (2018)
Thien, C.C., Lin, J.C.: Secret image sharing. Comput. Graph. 26(5), 765–770 (2002)
Weir, J., Yan, W.Q.: A comprehensive study of visual cryptography. In: Shi, Y.Q. (ed.) Transactions on Data Hiding and Multimedia Security V. LNCS, vol. 6010, pp. 70–105. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14298-7_5
Yadav, M., Ranvijay: A distortion free multi-secret image sharing with efficient shadow communication overhead. J. Inf. Optim. Sci. 39(1), 143–156 (2018)
Yan, X., Liu, L., Lu, Y., Gong, Q.: Security analysis and classification of image secret sharing. J. Inf. Secur. Appl. 47, 208–216 (2019). https://doi.org/10.1016/j.jisa.2019.05.008
Zhang, T., Ke, X., Liu, Y.: (t, n) multi-secret sharing scheme extended from Harn-Hsu’s scheme. EURASIP J. Wirel. Commun. Netw. (2018). https://doi.org/10.1186/s13638-018-1086-5
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Bhat, K. (2021). A Verifiable Lossless Multiple Secret Images Sharing Scheme. In: Tripathy, S., Shyamasundar, R.K., Ranjan, R. (eds) Information Systems Security. ICISS 2021. Lecture Notes in Computer Science(), vol 13146. Springer, Cham. https://doi.org/10.1007/978-3-030-92571-0_10
Download citation
DOI: https://doi.org/10.1007/978-3-030-92571-0_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-92570-3
Online ISBN: 978-3-030-92571-0
eBook Packages: Computer ScienceComputer Science (R0)