Abstract
Information security is of vital importance in today’s internet world. Classified data such as military and government information are constantly transmitted over the internet. Among this, top secret data are images such as maps and surveillance footage. It is thus necessary to secure such visual data against unauthorized access. Visual secret sharing is the process of distributing “shares” of a secret image among a group of individuals. Only when all the shares have been combined, can the original secret image be obtained. In this paper, we have proposed a visual secret sharing scheme, using a simple division algorithm, for group authentication systems. This method has the advantage of being both time efficient and devoid of any pixel expansion. It can be applied to both grayscale as well as colour images and, as illustrated further ahead, ensures complete secrecy and regeneration of the original image from all the shares.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Naor, M., Shamir, A.: Visual cryptography. In: Advances in Cryptology—EUROCRYPT ’94. Lecture Notes in Computer Science, vol. 950, pp. 1–12. Springer, Berlin (1994)
Adhikari, A., Bose, M.: A new visual cryptographic scheme using Latin squares. IEICE Trans. Fundam. E87-A, 1998–2002 (2004)
Zhou, Z., Arce, G.R., Crescenzo, G.D.: Halftone visual cryptography. IEEE Trans. Image Process. 15(8), 2441–2453 (2006)
Arya, K.V., Rishiwal, V., Yadav, A.K.: An efficient halftone visual secret sharing scheme. 2014 9th International Conference on Industrial and Information Systems (ICIIS), pp. 1, 5, 15–17 Dec 2014
Liu, F., Wu, C., Lin, X.: Step construction of visual cryptography schemes. IEEE Trans. Inf. Forensics Secur. 5(1), 27–38 (2010)
Liu, F, Wu, C.: Embedded extended visual cryptography schemes. IEEE Trans. Inf. Forensics Secur. 6(2), 307–322 (2011)
Wang, R.-Z., Hsu, S.-F.: Tagged visual cryptography. IEEE Sig. Process. Lett. 18(11), 627–630 (2011)
Reddy, B.D., Kumari, V.V., Raju, K.V.S.V.N, Raju, Y.H.P.: Visual cryptography using basic (2, 2) scheme. TECHNIA—Int. J. Comput. Sci. Commun. Technol. 3(2), 594–597 (2011). ISSN 0974-3375
Lin, S.-J., Ho, W.: A probabilistic model of (t, n) visual cryptography scheme with dynamic group. IEEE Trans. Inf. Forensics Secur. 7(1), 197–207 (2012)
Hu, C.-M., Tzeng, W.-G.: Cheating prevention in visual cryptography. Trans. Image Process. 16(1), 36–45 (2007)
Das, S.S., Das Sharma, K., Bera, J.N.: A simple visual secret sharing scheme employing particle swarm optimization. 2014 International Conference on Control, Instrumentation, Energy and Communication (CIEC), pp. 646, 649, 31 Jan 2014–2 Feb 2014
Hou, Y.-C., Quan, Z.-Y.: Progressive visual cryptography with unexpanded shares. Transactions letters. IEEE Trans. Circuits Syst. Video Technol. 21(11), 1760–1764 (2011)
Hou, Y.-C.: Visual Cryptography for Color Images. Department of Information Management, National Central University, Jung Li, Taiwan 320, ROC Received 6 June 2002, accepted 26 August 2002
Wu, X., Wong, D.S., Li, Q.: Threshold visual cryptography scheme for color images with no pixel expansion. In: Proceedings of the Second Symposium International Computer Science and Computational Technology(ISCSCT ’09), pp. 310–315. P. R. China, Huangshan, 26-28 Dec 2009. ISBN 978-952-5726-07-7 (Print), 978-952-5726-08-4 (CD-ROM)
Sai Chandana, B., Anuradha, S.: A new visual cryptography scheme for color images. Int. J. Eng. Sci. Technol. 2(6), 2398–2407 (2010)
Wang, D., Zhang, L., Ma, N., Li, X.: Two secret sharing schemes based on Boolean operations. Elsevier Pattern Recognit. 40, 2776–2785 (2007)
Wang, D.-S., Zhang, L., Ma, N., Huang, L.-S.: Secret color images sharing schemes based on XOR. Cryptology ePrint Archive: Report 2005/372
Harn, L., Lin, C.: An efficient group authentication for group communications. Int. J. Netw. Secur. Appl. (IJNSA) 5(3), 13–24 (2013)
Harn, L.: Group authentication. IEEE Trans. Comput. 62(9), 1893–1898 (2013)
Rosen, K.H.: Discrete Mathematics and Its Applications with Combinatorics and Graph Theory, 7th edn. McGraw Hill Education (India) Private Limited, 2008
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer India
About this paper
Cite this paper
Biswas, S., Dillen, N.B., Kole, D.K., Chakraborty, A. (2016). A Time Efficient Secret Image Sharing Scheme for Group Authentication System Without Pixel Expansions. In: Satapathy, S., Raju, K., Mandal, J., Bhateja, V. (eds) Proceedings of the Second International Conference on Computer and Communication Technologies. Advances in Intelligent Systems and Computing, vol 381. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2526-3_7
Download citation
DOI: https://doi.org/10.1007/978-81-322-2526-3_7
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2525-6
Online ISBN: 978-81-322-2526-3
eBook Packages: EngineeringEngineering (R0)