A Time Efficient Secret Image Sharing Scheme for Group Authentication System Without Pixel Expansions

  • Samarpita Biswas
  • Nicole Belinda Dillen
  • Dipak Kumar Kole
  • Aruna Chakraborty
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 381)


Information security is of vital importance in today’s internet world. Classified data such as military and government information are constantly transmitted over the internet. Among this, top secret data are images such as maps and surveillance footage. It is thus necessary to secure such visual data against unauthorized access. Visual secret sharing is the process of distributing “shares” of a secret image among a group of individuals. Only when all the shares have been combined, can the original secret image be obtained. In this paper, we have proposed a visual secret sharing scheme, using a simple division algorithm, for group authentication systems. This method has the advantage of being both time efficient and devoid of any pixel expansion. It can be applied to both grayscale as well as colour images and, as illustrated further ahead, ensures complete secrecy and regeneration of the original image from all the shares.


Visual cryptography Secret share scheme Division algorithm Group authentication 


  1. 1.
    Naor, M., Shamir, A.: Visual cryptography. In: Advances in Cryptology—EUROCRYPT ’94. Lecture Notes in Computer Science, vol. 950, pp. 1–12. Springer, Berlin (1994)Google Scholar
  2. 2.
    Adhikari, A., Bose, M.: A new visual cryptographic scheme using Latin squares. IEICE Trans. Fundam. E87-A, 1998–2002 (2004)Google Scholar
  3. 3.
    Zhou, Z., Arce, G.R., Crescenzo, G.D.: Halftone visual cryptography. IEEE Trans. Image Process. 15(8), 2441–2453 (2006)Google Scholar
  4. 4.
    Arya, K.V., Rishiwal, V., Yadav, A.K.: An efficient halftone visual secret sharing scheme. 2014 9th International Conference on Industrial and Information Systems (ICIIS), pp. 1, 5, 15–17 Dec 2014Google Scholar
  5. 5.
    Liu, F., Wu, C., Lin, X.: Step construction of visual cryptography schemes. IEEE Trans. Inf. Forensics Secur. 5(1), 27–38 (2010)Google Scholar
  6. 6.
    Liu, F, Wu, C.: Embedded extended visual cryptography schemes. IEEE Trans. Inf. Forensics Secur. 6(2), 307–322 (2011)Google Scholar
  7. 7.
    Wang, R.-Z., Hsu, S.-F.: Tagged visual cryptography. IEEE Sig. Process. Lett. 18(11), 627–630 (2011)Google Scholar
  8. 8.
    Reddy, B.D., Kumari, V.V., Raju, K.V.S.V.N, Raju, Y.H.P.: Visual cryptography using basic (2, 2) scheme. TECHNIA—Int. J. Comput. Sci. Commun. Technol. 3(2), 594–597 (2011). ISSN 0974-3375Google Scholar
  9. 9.
    Lin, S.-J., Ho, W.: A probabilistic model of (t, n) visual cryptography scheme with dynamic group. IEEE Trans. Inf. Forensics Secur. 7(1), 197–207 (2012)Google Scholar
  10. 10.
    Hu, C.-M., Tzeng, W.-G.: Cheating prevention in visual cryptography. Trans. Image Process. 16(1), 36–45 (2007)Google Scholar
  11. 11.
    Das, S.S., Das Sharma, K., Bera, J.N.: A simple visual secret sharing scheme employing particle swarm optimization. 2014 International Conference on Control, Instrumentation, Energy and Communication (CIEC), pp. 646, 649, 31 Jan 2014–2 Feb 2014Google Scholar
  12. 12.
    Hou, Y.-C., Quan, Z.-Y.: Progressive visual cryptography with unexpanded shares. Transactions letters. IEEE Trans. Circuits Syst. Video Technol. 21(11), 1760–1764 (2011)Google Scholar
  13. 13.
    Hou, Y.-C.: Visual Cryptography for Color Images. Department of Information Management, National Central University, Jung Li, Taiwan 320, ROC Received 6 June 2002, accepted 26 August 2002Google Scholar
  14. 14.
    Wu, X., Wong, D.S., Li, Q.: Threshold visual cryptography scheme for color images with no pixel expansion. In: Proceedings of the Second Symposium International Computer Science and Computational Technology(ISCSCT ’09), pp. 310–315. P. R. China, Huangshan, 26-28 Dec 2009. ISBN 978-952-5726-07-7 (Print), 978-952-5726-08-4 (CD-ROM)Google Scholar
  15. 15.
    Sai Chandana, B., Anuradha, S.: A new visual cryptography scheme for color images. Int. J. Eng. Sci. Technol. 2(6), 2398–2407 (2010)Google Scholar
  16. 16.
    Wang, D., Zhang, L., Ma, N., Li, X.: Two secret sharing schemes based on Boolean operations. Elsevier Pattern Recognit. 40, 2776–2785 (2007)Google Scholar
  17. 17.
    Wang, D.-S., Zhang, L., Ma, N., Huang, L.-S.: Secret color images sharing schemes based on XOR. Cryptology ePrint Archive: Report 2005/372Google Scholar
  18. 18.
    Harn, L., Lin, C.: An efficient group authentication for group communications. Int. J. Netw. Secur. Appl. (IJNSA) 5(3), 13–24 (2013)Google Scholar
  19. 19.
    Harn, L.: Group authentication. IEEE Trans. Comput. 62(9), 1893–1898 (2013)MathSciNetCrossRefGoogle Scholar
  20. 20.
    Rosen, K.H.: Discrete Mathematics and Its Applications with Combinatorics and Graph Theory, 7th edn. McGraw Hill Education (India) Private Limited, 2008Google Scholar

Copyright information

© Springer India 2016

Authors and Affiliations

  • Samarpita Biswas
    • 1
  • Nicole Belinda Dillen
    • 1
  • Dipak Kumar Kole
    • 2
  • Aruna Chakraborty
    • 1
  1. 1.St. Thomas’ College of Engineering and TechnologyKolkataIndia
  2. 2.Jalpaiguri Government Engineering CollegeJalpaiguriIndia

Personalised recommendations