Advertisement

An Efficient Secret Image Sharing Scheme Using an Effectual Position Exchange Technique

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 249)

Abstract

In image secret sharing scheme the specific image is distributed among a group of n participants. Each gets a shared image that has no visual relationship with the original one. The entire set or their subsets are used to reconstruct the secret image. The sharing schemes are useful for group authentication. In this paper, we proposed a novel approach to image secret sharing scheme where a secret image is transformed into an entirely new image by repositioning intensity values of each pixel using an effective position exchange technique. The transformed image undergoes a relatively less overhead negative transformation to make it more unpredictable. Finally n random numbers are generated for creating n shares in a way that their summation yields ‘1’ and they lay in some predefined interval. Each stage provides an additional level of security. The proposed method is simple and efficient and also ensures complete secrecy and reconstruction.

Keywords

Shared image negative transformation and position exchange technique 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Blakley, G.R.: Safeguarding Cryptographic keys. In: Proceeding of AFIPS 1979 National Computer Conference, New York, NY, vol. 48, pp. 313–317 (June 1979)Google Scholar
  2. 2.
    Shamir, A.: How to Share a Secret. Communications of the ACM 22(11), 612–613 (1979)MathSciNetCrossRefMATHGoogle Scholar
  3. 3.
    Naor, M., Shamir, A.: Visual Cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)CrossRefGoogle Scholar
  4. 4.
    Ateniese, G., Blundo, C., Santis, A.D., Atinson, D.: Atinson, Constructions and Bounds for Visual Cryptography. In: Meyer auf der Heide, F., Monien, B. (eds.) ICALP 1996. LNCS, vol. 1099, pp. 416–428. Springer, Heidelberg (1996)CrossRefGoogle Scholar
  5. 5.
    Chang, C., Tsait, C., Chen, T.: A New Scheme for Sharing Secret Colour Images in Computer Network. In: Proceeding of International Conference on Parallel and Distributed Systems, pp. 21–27 (July 2000)Google Scholar
  6. 6.
    Droste, S.: New Results on Visual Cryptography. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 401–415. Springer, Heidelberg (1996)Google Scholar
  7. 7.
    Hwang, R., Chang, C.: Some Secret Sharing Schemes and their Applications, Ph. D. dissertation of the Department of Computer Science and Information Engineering, National Chung Cheng University, Chiayi, Taiwan (1998)Google Scholar
  8. 8.
    Ateniese, G., Blundo, C., Santis, A.D., Atinson, D.: Visual Cryptography for General Access Structures. Information and Computation 129(2), 86–106 (1996)MathSciNetCrossRefMATHGoogle Scholar
  9. 9.
    Verheul, E., Tilborg, H.V.: Constructions and Propertics of k out of n Visual Secret Sharing Schemes. Designs, Codes and Cryptography 11(2), 179–196 (1997)MathSciNetCrossRefMATHGoogle Scholar
  10. 10.
    Adhikari, A., Bose, M.: A new visual cryptographic scheme using Latin squares. IEICE Transactions on Fundamentals E87-A, 1998–2002 (2004)Google Scholar
  11. 11.
    Zhou, Z., Arce, G.R., Crescenzo, G.D.: Halftone Visual Cryptography. IEEE Transactions on Image Processing 15(8) (August 2006)Google Scholar
  12. 12.
    Liu, F., Wu, C., Lin, X.: Step Construction of Visual Cryptography Schemes. IEEE Transactions on Information Forensics and Security 5(1) (March 2010)Google Scholar
  13. 13.
    Liu, F., Wu, C.: Embedded Extended Visual Cryptography Schemes. IEEE Transactions on Information Forensics and Security 6(2) (June 2011)Google Scholar
  14. 14.
    Wang, R.-Z., Hsu, S.-F.: Tagged Visual Cryptography. IEEE Signal Processing Letters 18(11) (November 2011)Google Scholar
  15. 15.
    Lin, S.-J., Wei-Ho: A Probabilistic Model of (t,n) Visual Cryptography Scheme With Dynamic Group. IEEE Transactions on Information Forensics and Security 7(1) (February 2012)Google Scholar
  16. 16.
    Hu, C.-M., Tzeng, W.-G.: Cheating Prevention in Visual Cryptography. IEEE Transactions on Image Processing 16(1) (January 2007)Google Scholar
  17. 17.
    SaiChandana, B., Anuradha, S.: A New Visual Cryptography Scheme for Color Images. Journal of Engineering Science and Technology 2(6), 1997–(2000)Google Scholar
  18. 18.
    Wang, D., Zhang, L., Ma, N., Li, X.: Two secret sharing schemes based on Boolean operations (received July 15, 2005); (received in revised form October 4, 2006); (accepted November 10, 2006)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.Department of Information TechnologySt. Thomas’ College of Engineering & TechnologyKolkataIndia
  2. 2.Department of Computer Science and EngineeringSt. Thomas’ College of Engineering & TechnologyKolkataIndia

Personalised recommendations