Skip to main content

A Time Efficient Secret Image Sharing Scheme for Group Authentication System Without Pixel Expansions

  • Conference paper
  • First Online:
Proceedings of the Second International Conference on Computer and Communication Technologies

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 381))

  • 978 Accesses

Abstract

Information security is of vital importance in today’s internet world. Classified data such as military and government information are constantly transmitted over the internet. Among this, top secret data are images such as maps and surveillance footage. It is thus necessary to secure such visual data against unauthorized access. Visual secret sharing is the process of distributing “shares” of a secret image among a group of individuals. Only when all the shares have been combined, can the original secret image be obtained. In this paper, we have proposed a visual secret sharing scheme, using a simple division algorithm, for group authentication systems. This method has the advantage of being both time efficient and devoid of any pixel expansion. It can be applied to both grayscale as well as colour images and, as illustrated further ahead, ensures complete secrecy and regeneration of the original image from all the shares.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Naor, M., Shamir, A.: Visual cryptography. In: Advances in Cryptology—EUROCRYPT ’94. Lecture Notes in Computer Science, vol. 950, pp. 1–12. Springer, Berlin (1994)

    Google Scholar 

  2. Adhikari, A., Bose, M.: A new visual cryptographic scheme using Latin squares. IEICE Trans. Fundam. E87-A, 1998–2002 (2004)

    Google Scholar 

  3. Zhou, Z., Arce, G.R., Crescenzo, G.D.: Halftone visual cryptography. IEEE Trans. Image Process. 15(8), 2441–2453 (2006)

    Google Scholar 

  4. Arya, K.V., Rishiwal, V., Yadav, A.K.: An efficient halftone visual secret sharing scheme. 2014 9th International Conference on Industrial and Information Systems (ICIIS), pp. 1, 5, 15–17 Dec 2014

    Google Scholar 

  5. Liu, F., Wu, C., Lin, X.: Step construction of visual cryptography schemes. IEEE Trans. Inf. Forensics Secur. 5(1), 27–38 (2010)

    Google Scholar 

  6. Liu, F, Wu, C.: Embedded extended visual cryptography schemes. IEEE Trans. Inf. Forensics Secur. 6(2), 307–322 (2011)

    Google Scholar 

  7. Wang, R.-Z., Hsu, S.-F.: Tagged visual cryptography. IEEE Sig. Process. Lett. 18(11), 627–630 (2011)

    Google Scholar 

  8. Reddy, B.D., Kumari, V.V., Raju, K.V.S.V.N, Raju, Y.H.P.: Visual cryptography using basic (2, 2) scheme. TECHNIA—Int. J. Comput. Sci. Commun. Technol. 3(2), 594–597 (2011). ISSN 0974-3375

    Google Scholar 

  9. Lin, S.-J., Ho, W.: A probabilistic model of (t, n) visual cryptography scheme with dynamic group. IEEE Trans. Inf. Forensics Secur. 7(1), 197–207 (2012)

    Google Scholar 

  10. Hu, C.-M., Tzeng, W.-G.: Cheating prevention in visual cryptography. Trans. Image Process. 16(1), 36–45 (2007)

    Google Scholar 

  11. Das, S.S., Das Sharma, K., Bera, J.N.: A simple visual secret sharing scheme employing particle swarm optimization. 2014 International Conference on Control, Instrumentation, Energy and Communication (CIEC), pp. 646, 649, 31 Jan 2014–2 Feb 2014

    Google Scholar 

  12. Hou, Y.-C., Quan, Z.-Y.: Progressive visual cryptography with unexpanded shares. Transactions letters. IEEE Trans. Circuits Syst. Video Technol. 21(11), 1760–1764 (2011)

    Google Scholar 

  13. Hou, Y.-C.: Visual Cryptography for Color Images. Department of Information Management, National Central University, Jung Li, Taiwan 320, ROC Received 6 June 2002, accepted 26 August 2002

    Google Scholar 

  14. Wu, X., Wong, D.S., Li, Q.: Threshold visual cryptography scheme for color images with no pixel expansion. In: Proceedings of the Second Symposium International Computer Science and Computational Technology(ISCSCT ’09), pp. 310–315. P. R. China, Huangshan, 26-28 Dec 2009. ISBN 978-952-5726-07-7 (Print), 978-952-5726-08-4 (CD-ROM)

    Google Scholar 

  15. Sai Chandana, B., Anuradha, S.: A new visual cryptography scheme for color images. Int. J. Eng. Sci. Technol. 2(6), 2398–2407 (2010)

    Google Scholar 

  16. Wang, D., Zhang, L., Ma, N., Li, X.: Two secret sharing schemes based on Boolean operations. Elsevier Pattern Recognit. 40, 2776–2785 (2007)

    Google Scholar 

  17. Wang, D.-S., Zhang, L., Ma, N., Huang, L.-S.: Secret color images sharing schemes based on XOR. Cryptology ePrint Archive: Report 2005/372

    Google Scholar 

  18. Harn, L., Lin, C.: An efficient group authentication for group communications. Int. J. Netw. Secur. Appl. (IJNSA) 5(3), 13–24 (2013)

    Google Scholar 

  19. Harn, L.: Group authentication. IEEE Trans. Comput. 62(9), 1893–1898 (2013)

    Article  MathSciNet  Google Scholar 

  20. Rosen, K.H.: Discrete Mathematics and Its Applications with Combinatorics and Graph Theory, 7th edn. McGraw Hill Education (India) Private Limited, 2008

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Samarpita Biswas .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer India

About this paper

Cite this paper

Biswas, S., Dillen, N.B., Kole, D.K., Chakraborty, A. (2016). A Time Efficient Secret Image Sharing Scheme for Group Authentication System Without Pixel Expansions. In: Satapathy, S., Raju, K., Mandal, J., Bhateja, V. (eds) Proceedings of the Second International Conference on Computer and Communication Technologies. Advances in Intelligent Systems and Computing, vol 381. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2526-3_7

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2526-3_7

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2525-6

  • Online ISBN: 978-81-322-2526-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics