Skip to main content
Log in

Collective control over sensitive video data using secret sharing

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Today digital video is used extensively in many applications. Sometimes a video could be treated as a top secret for an organization, for example military secrets, surveillance footage and corporate product designs, and may need to be shared among a group of people in a secure manner. Traditional data security methods such as encryption techniques are prone to single-point attack, i.e. the secret can be revealed by obtaining the decryption key from any single person. Alternatively, the secret sharing scheme provides collective control over the secrecy of information and is considered information theoretically secure. In this paper, we propose to adopt a secret sharing based approach to provide collective control over a given sensitive video. We present three methods that utilize the spatial and temporal redundancy in videos in different ways. We analyze the security of these methods and compare them for efficiency in terms of computation time and space using extensive experimentation.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Notes

  1. Preliminary version of this work with initial results was published in [2].

  2. http://www.acs.uwinnipeg.ca/pkatrey/vss/

References

  1. Alharthi S, Atrey PK (2010) Further improvements on secret image sharing scheme. In: MiFor’10: Proc. of the ACM multimedia workshop on multimedia in forensics, security and intelligence. Firenze, Italy, pp 53–58

  2. Alharthi S, Atrey PK, Kankanhalli MS (2010) Secret video sharing. In: Proc. of the APSIPA annual summit and conference 2010 (APSIPA-ASC 2010). Singapore

  3. Atrey PK, Hildebrand K, Ramanna S (2011) An efficient method for protection of text documents using secret sharing. In: Proc. of the international conference on frontiers of computer science. Bangalore, India

  4. Bai L (2006) A reliable (k, n) image secret sharing scheme. In: Proc. of the 2nd IEEE international symposium on dependable, autonomic and secure computing, DASC ’06. Indianapolis, USA, pp 31–36

  5. Cramer R, Damgrd I, Maurer U (2000) General secure multi-party computation from any linear secret-sharing scheme. In: LNCS Advances in Cryptology—EUROCRYPT. Springer-Verlag, pp 316–334

  6. Eskicioglu AM, Delp EJ (2002) An integrated approach to encrypting scalable video. In: Proc. of the IEEE international conference on multimedia and expo. Lausanne, Switzerland, pp 573–576

  7. Eskicioglu AM, Dexter S, Delp EJ (2003) Protection of multicast scalable video by secret sharing: simulation results. In: Proc. of the royal society of London, pp 197–204

  8. Feldman J, Malkin T, Servedio RA, Stein C (2004) Secure network coding via filtered secret sharing

  9. Guo H, Georganas ND (2003) A novel approach to digital image watermarking based on a generalized secret sharing scheme. Multimedia Systems 9(3):249–260

    Article  Google Scholar 

  10. Kezia H, Sudha GF (2008) Encryption of digital video based on lorenz chaotic system. In: Proc. of the 16th international conference on advanced computing and communications. Chennai, India, pp 40–45

  11. Krawczyk H (1994) Secret sharing made short. In: Proc. of the 13th annual international cryptology conference on advances in cryptology, CRYPTO ’93. London, pp 136–146

  12. Li S, Zheng X, Mou X, Cai Y (2002) Chaotic encryption scheme for real-time digital video video. In: Proc. of SPIE electronic imaging—real-time imaging VI, vol 4666. San Jose, pp 149–160

  13. Lin CC, Tsai WH (2003) A new approach to video sharing with steganographics effects. In: Proc. of the conference on computer vision, graphics and image processing, CVGIP’03

  14. Liu F, Koenig H (2010) A survey of video encryption algorithms. Elsevier Journal of Computers and Security 29(1):3–15

    Article  Google Scholar 

  15. Liu F, Wu CK, Lin XJ (2008) Colour visual cryptography schemes. IET Inf Secur 2:151–165

    Article  MathSciNet  Google Scholar 

  16. Lukac R, Plataniotis K (2004) Document image secret sharing using bit-level processing. In: ICIP’04: Proc. of IEEE international conference on image processing. Singapore, pp 2893–2896

  17. Ma C, Cheng R (2008) Information security and cryptology. chap. Key Management Based on Hierarchical Secret Sharing in Ad-Hoc Networks. Springer-Verlag, pp 182–191

  18. Mink A, Tang X, Ma L, Nakassis T, Hershman B (2006) High speed quantum key distribution system supports one-time pad encryption of real-time video. In: Proc. of SPIE 6244, quantum information and computation IV, 62440M. San Jose, CA, USA

  19. Naor M, Shamir A (1994) Visual cryptography. In: EUROCRYPT. Perugia, Italy, pp 1–12

  20. Raju C, Umadevi G, Srinathan K, Jawahar C (2008) A novel video encryption technique based on secret sharing. In: Proc. of the IEEE international conference on image processing, ICIP ’08. San Diego, California, USA, pp 3136–3139

  21. Schoenmakers B (1999) A simple publicly verifiable secret sharing scheme and its application to electronic voting. In: LNCS advances in cryptology—CRYPTO, vol 1666. Springer-Verlag, p 784

  22. Shamir A (1979) How to share a secret. Commun ACM 22:612–613

    Article  MATH  MathSciNet  Google Scholar 

  23. Shyu SJ, Huang SY, Lee YK, Wang RZ, Chen K (2007) Sharing multiple secrets in visual cryptography. Pattern Recogn 40:3633–3651

    Article  MATH  Google Scholar 

  24. Simitopoulos D, Zissis N, Georgiadis P, Emmanouilidis V, Strintzis MG (2003) Encryption and watermarking for the secure distribution of copyrighted mpeg video on dvd. Multimedia Systems 9(3):217–227

    Article  Google Scholar 

  25. Stinson DR (1995) Cryptography: theory and practice, 1st edn, Chap 11. CRC Press, Boca Raton

    MATH  Google Scholar 

  26. Takizawa O, Yamamura A (2004) Secret sharing scheme using natural language text. Transactions of Information Processing Society of Japan 45:320–323

    Google Scholar 

  27. Thien CC, Lin JC (2002) Secret image sharing. Comput Graph 26(5):765–770

    Article  Google Scholar 

Download references

Acknowledgements

Authors would like to thank their colleagues, Majid Khabbazian from University of Alberta and Manoranjan Mohanty from National University of Singapore, for their help in security analysis of the proposed methods. This research is supported by National Plan for Science and Technology (NPST) program by King Saud University Project Number 11-INF1830-02.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pradeep K. Atrey.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Atrey, P.K., Alharthi, S., Hossain, M.A. et al. Collective control over sensitive video data using secret sharing. Multimed Tools Appl 73, 1459–1486 (2014). https://doi.org/10.1007/s11042-013-1644-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-013-1644-0

Keywords

Navigation