Skip to main content

A Verifiable Lossless Multiple Secret Images Sharing Scheme

  • Conference paper
  • First Online:
Information Systems Security (ICISS 2021)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 13146))

Included in the following conference series:

  • 501 Accesses

Abstract

In the recent years, the researchers have proposed several schemes for sharing multiple secret images using less number of shares through different operations in order to save storage memory and network bandwidth consumption. However, the existing schemes suffer from one or more of the following limitations, viz. no verification of reconstructed secret images, no support for resistance against loss of single share, support for sharing only 2 secret images, incompatibility for sharing single secret image, lossy reconstruction of secret images and no support for sharing all types (binary, grayscale and color) of images. The proposed scheme overcomes these existing limitations, and shares \(u-1\) secret images in \(v\) (\(v\ge 2\)) shares out of which at least \(u\) (\(2 \le u\le v\)) shares are required to reconstruct all \(u-1\) secret images. The operations are performed in galois field \( GF(2^{8}) \) during shares generation and secret images reconstruction. The verification of the reconstructed secret images is done by using a random authentication image. The theoretical analysis, comparison and experimental results are provided to indicate the validity, merits and implementability of the proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ahmed, M., Abdul-kader, H.S., kishk, A., Abdo, A.A.: An efficient multi secret image sharing scheme using hill cipher. In: Hassanien, A.-E., Azar, A.T., Gaber, T., Oliva, D., Tolba, F.M. (eds.) AICV 2020. AISC, vol. 1153, pp. 604–613. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-44289-7_57

    Chapter  Google Scholar 

  2. Azza, A.A., Lian, S.: Multi-secret image sharing based on elementary cellular automata with steganography. Multimedia Tools Appl. 79, 21241–21264 (2020)

    Article  Google Scholar 

  3. Bhat, K., Uday Kumar Reddy, K.R., Ranjan Kumar, H.S., Mahto, D.: A novel scheme for lossless authenticated multiple secret images sharing using polynomials and extended visual cryptography. IET Inf. Secur. 15(1), 13–22 (2021)

    Google Scholar 

  4. Bhosale, A.G., Patil, V.S.: A (2, 2) visual cryptography technique to share two secrets. In: 2020 International Conference on Inventive Computation Technologies (ICICT), pp. 563–569 (2020). https://doi.org/10.1109/ICICT48043.2020.9112420

  5. Chang, J.J.Y., Huang, B.Y., Juan, J.S.T.: A new visual multi-secrets sharing scheme by random grids. Cryptography 2(3) (2018). https://doi.org/10.3390/cryptography2030024

  6. Chanu, O.B., Neelima, A.: A new multi-secret image sharing scheme based on DCT. Vis. Comput. 36, 939–950 (2020)

    Article  Google Scholar 

  7. Chattopadhyay, A.K., Nag, A., Singh, J.P., Singh, A.K.: A verifiable multi-secret image sharing scheme using XOR operation and hash function. Multimedia Tools Appl. (2020). https://doi.org/10.1007/s11042-020-09174-0

    Article  Google Scholar 

  8. Chen, C.C., Chen, J.L.: A new Boolean-based multiple secret image sharing scheme to share different sized secret images. J. Inf. Secur. Appl. 33, 45–54 (2017)

    Google Scholar 

  9. Deshmukha, M., Nainb, N., Ahmed, M.: A novel approach for sharing multiple color images by employing Chinese remainder theorem. J. Vis. Commun. Image Represent. 49, 291–302 (2017)

    Article  Google Scholar 

  10. Huang, B.Y., Juan, J.S.T.: Flexible meaningful visual multi-secret sharing scheme by random grids. Multimedia Tools Appl. 79, 7705–7729 (2020)

    Article  Google Scholar 

  11. Kabirirad, S., Eslami, Z.: A (t, n)-multi secret image sharing scheme based on Boolean operations. J. Vis. Commun. Image Represent. 57, 39–47 (2018)

    Article  Google Scholar 

  12. Kabirirad, S., Eslami, Z.: Improvement of (n, n)-multi-secret image sharing schemes based on Boolean operations. J. Inf. Secur. Appl. 47, 16–27 (2019)

    Google Scholar 

  13. Kapadiya, V.J., Desai, L.S., Meghrajani, Y.K.: Boolean-based multi secret sharing scheme using meaningful shares. In: 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT), pp. 840–844 (2018). https://doi.org/10.1109/ICICCT.2018.8473323

  14. Shankar, K., Devika, G., Ilayaraja, M.: Scheme based on Boolean operations and elliptic curve cryptography. Int. J. Pure Appl. Math. 116(10), 293–300 (2017)

    Google Scholar 

  15. Mary, I.R.P., Eswaran, P., Shankar, K.: Multi secret image sharing scheme based on DNA cryptography with XOR. Int. J. Pure Appl. Math. 118(7), 393–398 (2018)

    Google Scholar 

  16. Matsumoto, M., Nishimura, T.: Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator. ACM Trans. Model. Comput. Simul. 8(1), 3–30 (1998)

    Article  Google Scholar 

  17. Meghrajani, Y.K., Desai, L.S., Mazumdar, H.S.: Secure and efficient arithmetic-based multi-secret image sharing scheme using universal share. J. Inf. Secur. Appl. 47, 267–274 (2019)

    Google Scholar 

  18. Mishra, A., Gupta, A.: Multi secret sharing scheme using iterative method. J. Inf. Optim. Sci. 39(3), 631–641 (2018)

    MathSciNet  Google Scholar 

  19. Mishra, K., Kavala, S., Singh, S.K., Nagabhushan, P.: Efficient collusion resistant multi-secret image sharing. Multimedia Tools Appl. 79, 33233–33252 (2020)

    Article  Google Scholar 

  20. Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995). https://doi.org/10.1007/BFb0053419

    Chapter  Google Scholar 

  21. Nitharwal, S.M., Verma, H.K.: A Boolean-based multi-secret image sharing scheme using bit-reversal. In: 2017 International Conference on Intelligent Communication and Computational Techniques (ICCT), pp. 114–118 (2017). https://doi.org/10.1109/INTELCCT.2017.8324030

  22. Prasetyo, H., Guo, J.: A note on multiple secret sharing using Chinese remainder theorem and exclusive-or. IEEE Access 7, 37473–37497 (2019)

    Article  Google Scholar 

  23. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)

    Article  MathSciNet  Google Scholar 

  24. Shivani, S.: Multi secret sharing with unexpanded meaningful shares. Multimedia Tools Appl. 77, 6287–6310 (2018)

    Article  Google Scholar 

  25. Thien, C.C., Lin, J.C.: Secret image sharing. Comput. Graph. 26(5), 765–770 (2002)

    Article  Google Scholar 

  26. Weir, J., Yan, W.Q.: A comprehensive study of visual cryptography. In: Shi, Y.Q. (ed.) Transactions on Data Hiding and Multimedia Security V. LNCS, vol. 6010, pp. 70–105. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14298-7_5

    Chapter  Google Scholar 

  27. Yadav, M., Ranvijay: A distortion free multi-secret image sharing with efficient shadow communication overhead. J. Inf. Optim. Sci. 39(1), 143–156 (2018)

    MathSciNet  Google Scholar 

  28. Yan, X., Liu, L., Lu, Y., Gong, Q.: Security analysis and classification of image secret sharing. J. Inf. Secur. Appl. 47, 208–216 (2019). https://doi.org/10.1016/j.jisa.2019.05.008

  29. Zhang, T., Ke, X., Liu, Y.: (t, n) multi-secret sharing scheme extended from Harn-Hsu’s scheme. EURASIP J. Wirel. Commun. Netw. (2018). https://doi.org/10.1186/s13638-018-1086-5

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bhat, K. (2021). A Verifiable Lossless Multiple Secret Images Sharing Scheme. In: Tripathy, S., Shyamasundar, R.K., Ranjan, R. (eds) Information Systems Security. ICISS 2021. Lecture Notes in Computer Science(), vol 13146. Springer, Cham. https://doi.org/10.1007/978-3-030-92571-0_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-92571-0_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-92570-3

  • Online ISBN: 978-3-030-92571-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics