Skip to main content
Log in

Image Based Steganography to Facilitate Improving Counting-Based Secret Sharing

  • 3DR Express
  • Published:
3D Research

Abstract

The secret sharing scheme is a security tool that provides reliability and robustness for multi-user authentication systems. This work focuses on improving the security and efficiency of counting-based secret sharing by remodeling its phases. The research presents refining the shares generation phase as well as proposing different secret reconstruction models based on new shares distribution method. This work addressed solving published defects in the original counting-based secret sharing scheme providing optimized efficient methodology. The research further proposed utilizing steganography for practicality purposes. We adopted image-based steganography to hide generated shares preserving the improved security of the scheme enhancing the humanized remembrance usability. The study compared several applicable steganography methods for hiding shares analyzing their distortion, security, and capacity. This facilitating work of image-based steganography with the improved counting-based secret sharing is showing promising results opening research direction for future attractive contributions to follow-on.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26
Fig. 27
Fig. 28
Fig. 29
Fig. 30
Fig. 31
Fig. 32

Similar content being viewed by others

References

  1. Gutub, A., Al-Juaid, N., & Khan, E. (2017). Counting-based secret sharing technique for multimedia applications. Multimedia Tools and Applications. https://doi.org/10.1007/s11042-017-5293-6.

    Article  Google Scholar 

  2. Gutub, A., & Khan, E. (2011). Using subthreshold SRAM to design low-power crypto hardware. International Journal of New Computer Architectures and their Applications, 1, 10.

    Google Scholar 

  3. Al-Ghamdi, M., Al-Ghamdi, M., & Gutub, A. (2018). Security enhancement of shares generation process for multimedia counting-based secret-sharing technique. Multimedia Tools and Applications. https://doi.org/10.1007/s11042-018-6977-2.

  4. Shamir, A. (1979). How to share a secret. Communications of the ACM, 22(11), 612–613.

    Article  MathSciNet  Google Scholar 

  5. Blakley, G. R. (1979). Safeguarding cryptographic keys. Presented at the proceedings of 1979 AFIPS National computer conference (p. 6).

  6. Harn, L. (2014). Secure secret reconstruction and multi-secret sharing schemes with unconditional security. Security and Communication Networks, 7(3), 567–573.

    Article  Google Scholar 

  7. Alanizy, N., Alanizy, A., Baghoza, N., Al Ghamdi, M., & Gutub, A. (2018). 3-Layer PC text security via combining compression, AES cryptography 2LSB image steganography. Journal of Research in Engineering and Applied Sciences (JREAS), 3(4), 118–124.

    Google Scholar 

  8. Gutub, A., Al-Alwani, W., & Mahfoodh, A. B. (2010). Improved method of arabic text steganography using the extension ‘Kashida’ character. Bahria University Journal of Information & Communication Technology (BUJICT), 3(1), 68–72.

    Google Scholar 

  9. Al-Nofaie, S., Fattani, M., & Gutub, A. (2016). Merging two steganography techniques adjusted to improve arabic text data security. Journal of Computer Science & Computational Mathematics (JCSCM), 6(3), 59–65. https://doi.org/10.20967/jcscm.2016.03.004.

    Article  Google Scholar 

  10. Hussain, M., Wahab, A. W. A., Idris, Y. I. B., Ho, A. T. S., & Jung, K.-H. (2018). Image steganography in spatial domain: A survey. Signal Processing: Image Communication, 65, 46–66.

    Google Scholar 

  11. Gutub, A., Ankeer, M., Abu-Ghalioun, M., Shaheen, A., & Alvi, A. (2008). Pixel indicator high capacity technique for RGB image based steganography. In WOSPA 20085th IEEE international workshop on signal processing and its applications, University of Sharjah, UAE.

  12. Alaseri, K., & Gutub, A. (2018). Merging secret sharing within arabic text steganography for practical retrieval. IJRDO: Journal of Computer Science Engineering, 4(9), 1–17.

    Google Scholar 

  13. Gutub, A. (2010). Pixel indicator technique for RGB image steganography. Journal of Emerging Technologies in Web Intelligence, 2(1), 56–64.

    Google Scholar 

  14. Gutub, A., Al-Qahtani, A., & Tabakh, A. (2009). Triple-A: secure RGB image steganography based on randomization. In: Proceedings of the IEEE/ACS international conference on computer systems and applications, Rabat.

  15. Khan, F., & Gutub, A. (2007). Message concealment techniques using image based steganography. In The 4th IEEE GCC conference and exhibition, Manamah, Bahrain (pp. 11–14).

  16. Al-Juaid, N., Gutub, A., & Khan, E. (2018). Enhancing PC data security via combining RSA cryptography and video based steganography. Journal of Information Security and Cybercrimes Research (JISCR), 1(1), 8–18.

    Google Scholar 

  17. Gutub, A., & Al-Juaid, N. (2018). Multi-bits stego-system for hiding text in multimedia images based on user security priority. Journal of Computer Hardware Engineering. https://doi.org/10.63019/jche.v1i2.513.

    Article  Google Scholar 

  18. Parvez, M. T., & Gutub, A. (2011). Vibrant color image steganography using channel differences and secret data distribution. Kuwait Journal of Science and Engineering (KJSE), 38(1B), 127–142.

    Google Scholar 

  19. Parvez, M. T., & Gutub, A. (2008). RGB intensity based variable-bits image steganography. In APSCC 2008Proceedings of 3rd IEEE Asia-Pacific services computing conference, Yilan, Taiwan (pp. 9–12).

  20. Abu-Marie, W., Gutub, A., & Abu-Mansour, H. (2010). Image based steganography using truth table based and determinate array on RGB indicator. International Journal of Signal and Image Processing, 1, 196–204.

    Google Scholar 

  21. Gutub, A., El-Shafei, A. R., & Aabed, A. (2011). Implementation of a pipelined modular multiplier architecture for GF(P) elliptic curve cryptography computation. Kuwait Journal of Science and Engineering, 38(2B), 125–153.

    Google Scholar 

  22. Alassaf, N., Gutub, A., Parah, S., & Al Ghamdi, M. (2018). Enhancing speed of SIMON: A light-weight-cryptographic algorithm for IoT applications. Multimedia Tools and Applications. https://doi.org/10.1007/s11042-018-6801-z.

    Article  Google Scholar 

  23. Liu, Z., Ahmad, M. A., & Liu, S. (2008). Image sharing scheme based on combination theory. Optics Communications, 281, 5322–5325.

    Article  Google Scholar 

  24. Liu, Z., Liu, S., & Ahmad, M. A. (2010). Image sharing scheme based on discrete fractional random transform. Optik, 121, 495–499.

    Article  Google Scholar 

  25. Girija, R., & Singh, H. (2018). Symmetric cryptosystem based on chaos structured phase masks and equal modulus decomposition using fractional Fourier transform. 3D Research, 3, 42.

    Article  Google Scholar 

  26. Al-Qurashi, A., & Gutub, A. (2018). Reliable secret key generation for counting-based secret sharing. Journal of Computer Science & Computational Mathematics. https://doi.org/10.20967/jcscm.2018.04.006.

    Article  Google Scholar 

  27. Almazrooie, M., Samsudin, A., Gutub, A., Salleh, M. S., Omar, M. A., & Hassan, S. A. (2018). Integrity verification for digital Holy Quran verses using cryptographic hash function and compression. Journal of King Saud University: Computer and Information Sciences. https://doi.org/10.1016/j.jksuci.2018.02.006.

    Article  Google Scholar 

  28. Lin, C.-C., & Tsai, W.-H. (2004). Secret image sharing with steganography and authentication. Journal of Systems and Software, 73(3), 405–414.

    Article  Google Scholar 

  29. Yang, C.-N., Chen, T.-S., Yu, K. H., & Wang, C.-C. (2007). Improvements of image sharing with steganography and authentication. Journal of Systems and Software, 80(7), 1070–1076.

    Article  Google Scholar 

  30. Chang, C.-C., Hsieh, Y.-P., & Lin, C.-H. (2008). Sharing secrets in stego images with authentication. Pattern Recognition, 41(10), 3130–3137.

    Article  Google Scholar 

  31. Chang, C.-C., Chen, Y.-H., & Wang, H.-C. (2011). Meaningful secret sharing technique with authentication and remedy abilities. Information Sciences, 181(14), 3073–3084.

    Article  MathSciNet  Google Scholar 

  32. Wang, H., & Wong, D. S. (2008). On secret reconstruction in secret sharing schemes. IEEE Transactions on Information Theory, 54(1), 473–480.

    Article  MathSciNet  Google Scholar 

  33. He, J., & Dawson, E. (1998). Shared secret reconstruction. Designs, Codes and Cryptography SP, 14(3), 221–237. https://doi.org/10.1023/a:1008200702849.

    Article  MathSciNet  MATH  Google Scholar 

  34. Das, S. K., & Dhara, B. C. (2015). A new secret image sharing with arithmetic coding. In 2015 IEEE international conference on research in computational intelligence and communication networks (ICRCICN), Kolkata (pp. 395–399). https://doi.org/10.1109/icrcicn.2015.7434271.

  35. Sahu, A. K., & Swain, G. (2016). A review on LSB substitution and PVD based image steganography techniques. Indonesian Journal of Electrical Engineering and Computer Science, 2(3), 712.

    Article  Google Scholar 

  36. Lashkari, A. H., Manaf, A. A., Masrom, M., Daud, S. M. (2011). A survey on image steganography algorithms and evaluation. In Communications in computer and information science book series (Vol. 188).

  37. Lin, P.-Y., & Chan, C.-S. (2010). Invertible secret image sharing with steganography. Pattern Recognition Letters, 31(13), 1887–1893.

    Article  Google Scholar 

  38. Yuan, H.-D. (2014). Secret sharing with multi-cover adaptive steganography. Information Sciences, 254, 197–212.

    Article  MathSciNet  Google Scholar 

  39. Alsaidi, A., Al-lehaibi, K., Alzahrani, H., AlGhamdi, M., & Gutub, A. (2018). Compression multi-level crypto stego security of texts utilizing colored email forwarding. Journal of Computer Science & Computational Mathematics (JCSCM), 8(3), 33–42. https://doi.org/10.20967/jcscm.2018.03.002.

    Article  Google Scholar 

  40. Gutub, A., & Fattani, M. (2007). A novel arabic text steganography method using letter points and extensions. In WASET international conference on computer, information and systems science and engineering (ICCISSE), Vienna, Austria, May 25–27, 2007.

  41. Ahmadoh, E., & Gutub, A. (2015). Utilization of two diacritics for arabic text steganography to enhance performance. Lecture Notes on Information Theory, 3(1), 42–47.

    Article  Google Scholar 

Download references

Acknowledgements

Thanks to Umm Al-Qura University (UQU), Makkah, Saudi Arabia, for supporting this research.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Adnan Gutub.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gutub, A., Al-Ghamdi, M. Image Based Steganography to Facilitate Improving Counting-Based Secret Sharing. 3D Res 10, 6 (2019). https://doi.org/10.1007/s13319-019-0216-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s13319-019-0216-0

Keywords

Navigation