Skip to main content

A Novel Approach of an (nn) Multi-Secret Image Sharing Scheme Using Additive Modulo

  • Conference paper
  • First Online:
Proceedings of International Conference on Computer Vision and Image Processing

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 459))

Abstract

Secret sharing scheme (SSS) is an efficient method of transmitting one or more secret images securely. The conventional SSS share one secret image to n participants. With the advancement of time, there arises a need for sharing multiple secret image. An (nn)-Multi-Secret Image Sharing (MSIS) scheme is used to encrypt n secret images into n meaningless shared images and stored it in different database servers. For recovery of secrets all n shared images are required. In earlier work n secret images are shared among n or \(n+1\) shared images, which has a problem as one can recover fractional information from less than n shared images. Therefore, we need a more efficient and secure (nn)-MSIS scheme so that less than n shared images do not reveal fractional information. In this paper, we propose an (nn)-MSIS scheme using additive modulo and reverse bit operation for binary, grayscale, and colored images. The experimental results report that the proposed scheme requires minimal computation time for encryption and decryption. For quantitative analysis Peak Signal to Noise Ratio (PSNR), Correlation, and Root Mean Square Error (RMSE) techniques are used. The proposed (nn)-MSIS scheme outperforms the existing state-of-the-art techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Naor, Moni, and Adi Shamir. “Visual cryptography.” Advances in CryptologyEUROCRYPT’94. Springer Berlin/Heidelberg, 1995.

    Google Scholar 

  2. Blakley, George Robert. “Safeguarding cryptographic keys.” Proceedings of the national computer conference. Vol. 48. 1979.

    Google Scholar 

  3. Yang, Ching-Nung, Cheng-Hua Chen, and Song-Ruei Cai. “Enhanced Boolean-based multi secret image sharing scheme.” Journal of Systems and Software (2015).

    Google Scholar 

  4. Wei, Shih-Chieh, Young-Chang Hou, and Yen-Chun Lu. “A technique for sharing a digital image.” Computer Standards and Interfaces 40 (2015): 53–61.

    Google Scholar 

  5. Lin, Tsung-Lieh, et al. “A novel visual secret sharing scheme for multiple secrets without pixel expansion.” Expert systems with applications 37.12 (2010): 7858–7869.

    Google Scholar 

  6. Lin, Kai-Siang, Chih-Hung Lin, and Tzung-Her Chen. “Distortionless visual multi-secret sharing based on random grid.” Information Sciences 288 (2014): 330–346.

    Google Scholar 

  7. Blundo, Carlo, et al. “Multi-secret sharing schemes.” Advances in Cryptology-CRYPTO94. Springer Berlin Heidelberg, 1994.

    Google Scholar 

  8. Shyu, Shyong Jian. “Image encryption by random grids.” Pattern Recognition 40.3 (2007): 1014–1031.

    Google Scholar 

  9. Wang, Ran-Zan, et al. “Incrementing visual cryptography using random grids.” Optics Communications 283.21 (2010): 4242–4249.

    Google Scholar 

  10. Guo, Teng, Feng Liu, and ChuanKun Wu. “k out of k extended visual cryptography scheme by random grids.” Signal Processing 94 (2014): 90–101.

    Google Scholar 

  11. Chen, Tzung-Her, and Kai-Hsiang Tsao. “Threshold visual secret sharing by random grids.” Journal of Systems and Software 84.7 (2011): 1197–1208.

    Google Scholar 

  12. Maroti Deshmukh, Munaga V.N.K. Prasad. “Comparative Study of Visual Secret Sharing Schemes to Protect Iris Image.” International Conference on Image and Signal Processing (ICISP), (2014): 91–98.

    Google Scholar 

  13. Wang, Daoshun, et al. “Two secret sharing schemes based on Boolean operations.” Pattern Recognition 40.10 (2007): 2776–2785.

    Google Scholar 

  14. Chen, Tzung-Her, and Chang-Sian Wu. “Efficient multi-secret image sharing based on Boolean operations.” Signal Processing 91.1 (2011): 90–97.

    Google Scholar 

  15. Chen, Chien-Chang, and Wei-Jie Wu. “A secure Boolean-based multi-secret image sharing scheme.” Journal of Systems and Software 92 (2014): 107–114.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Maroti Deshmukh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Science+Business Media Singapore

About this paper

Cite this paper

Deshmukh, M., Nain, N., Ahmed, M. (2017). A Novel Approach of an (nn) Multi-Secret Image Sharing Scheme Using Additive Modulo. In: Raman, B., Kumar, S., Roy, P., Sen, D. (eds) Proceedings of International Conference on Computer Vision and Image Processing. Advances in Intelligent Systems and Computing, vol 459. Springer, Singapore. https://doi.org/10.1007/978-981-10-2104-6_14

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-2104-6_14

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-2103-9

  • Online ISBN: 978-981-10-2104-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics