Abstract
Today digital video is used extensively in many applications. Sometimes a video could be treated as a top secret for an organization, for example military secrets, surveillance footage and corporate product designs, and may need to be shared among a group of people in a secure manner. Traditional data security methods such as encryption techniques are prone to single-point attack, i.e. the secret can be revealed by obtaining the decryption key from any single person. Alternatively, the secret sharing scheme provides collective control over the secrecy of information and is considered information theoretically secure. In this paper, we propose to adopt a secret sharing based approach to provide collective control over a given sensitive video. We present three methods that utilize the spatial and temporal redundancy in videos in different ways. We analyze the security of these methods and compare them for efficiency in terms of computation time and space using extensive experimentation.
Similar content being viewed by others
Notes
Preliminary version of this work with initial results was published in [2].
References
Alharthi S, Atrey PK (2010) Further improvements on secret image sharing scheme. In: MiFor’10: Proc. of the ACM multimedia workshop on multimedia in forensics, security and intelligence. Firenze, Italy, pp 53–58
Alharthi S, Atrey PK, Kankanhalli MS (2010) Secret video sharing. In: Proc. of the APSIPA annual summit and conference 2010 (APSIPA-ASC 2010). Singapore
Atrey PK, Hildebrand K, Ramanna S (2011) An efficient method for protection of text documents using secret sharing. In: Proc. of the international conference on frontiers of computer science. Bangalore, India
Bai L (2006) A reliable (k, n) image secret sharing scheme. In: Proc. of the 2nd IEEE international symposium on dependable, autonomic and secure computing, DASC ’06. Indianapolis, USA, pp 31–36
Cramer R, Damgrd I, Maurer U (2000) General secure multi-party computation from any linear secret-sharing scheme. In: LNCS Advances in Cryptology—EUROCRYPT. Springer-Verlag, pp 316–334
Eskicioglu AM, Delp EJ (2002) An integrated approach to encrypting scalable video. In: Proc. of the IEEE international conference on multimedia and expo. Lausanne, Switzerland, pp 573–576
Eskicioglu AM, Dexter S, Delp EJ (2003) Protection of multicast scalable video by secret sharing: simulation results. In: Proc. of the royal society of London, pp 197–204
Feldman J, Malkin T, Servedio RA, Stein C (2004) Secure network coding via filtered secret sharing
Guo H, Georganas ND (2003) A novel approach to digital image watermarking based on a generalized secret sharing scheme. Multimedia Systems 9(3):249–260
Kezia H, Sudha GF (2008) Encryption of digital video based on lorenz chaotic system. In: Proc. of the 16th international conference on advanced computing and communications. Chennai, India, pp 40–45
Krawczyk H (1994) Secret sharing made short. In: Proc. of the 13th annual international cryptology conference on advances in cryptology, CRYPTO ’93. London, pp 136–146
Li S, Zheng X, Mou X, Cai Y (2002) Chaotic encryption scheme for real-time digital video video. In: Proc. of SPIE electronic imaging—real-time imaging VI, vol 4666. San Jose, pp 149–160
Lin CC, Tsai WH (2003) A new approach to video sharing with steganographics effects. In: Proc. of the conference on computer vision, graphics and image processing, CVGIP’03
Liu F, Koenig H (2010) A survey of video encryption algorithms. Elsevier Journal of Computers and Security 29(1):3–15
Liu F, Wu CK, Lin XJ (2008) Colour visual cryptography schemes. IET Inf Secur 2:151–165
Lukac R, Plataniotis K (2004) Document image secret sharing using bit-level processing. In: ICIP’04: Proc. of IEEE international conference on image processing. Singapore, pp 2893–2896
Ma C, Cheng R (2008) Information security and cryptology. chap. Key Management Based on Hierarchical Secret Sharing in Ad-Hoc Networks. Springer-Verlag, pp 182–191
Mink A, Tang X, Ma L, Nakassis T, Hershman B (2006) High speed quantum key distribution system supports one-time pad encryption of real-time video. In: Proc. of SPIE 6244, quantum information and computation IV, 62440M. San Jose, CA, USA
Naor M, Shamir A (1994) Visual cryptography. In: EUROCRYPT. Perugia, Italy, pp 1–12
Raju C, Umadevi G, Srinathan K, Jawahar C (2008) A novel video encryption technique based on secret sharing. In: Proc. of the IEEE international conference on image processing, ICIP ’08. San Diego, California, USA, pp 3136–3139
Schoenmakers B (1999) A simple publicly verifiable secret sharing scheme and its application to electronic voting. In: LNCS advances in cryptology—CRYPTO, vol 1666. Springer-Verlag, p 784
Shamir A (1979) How to share a secret. Commun ACM 22:612–613
Shyu SJ, Huang SY, Lee YK, Wang RZ, Chen K (2007) Sharing multiple secrets in visual cryptography. Pattern Recogn 40:3633–3651
Simitopoulos D, Zissis N, Georgiadis P, Emmanouilidis V, Strintzis MG (2003) Encryption and watermarking for the secure distribution of copyrighted mpeg video on dvd. Multimedia Systems 9(3):217–227
Stinson DR (1995) Cryptography: theory and practice, 1st edn, Chap 11. CRC Press, Boca Raton
Takizawa O, Yamamura A (2004) Secret sharing scheme using natural language text. Transactions of Information Processing Society of Japan 45:320–323
Thien CC, Lin JC (2002) Secret image sharing. Comput Graph 26(5):765–770
Acknowledgements
Authors would like to thank their colleagues, Majid Khabbazian from University of Alberta and Manoranjan Mohanty from National University of Singapore, for their help in security analysis of the proposed methods. This research is supported by National Plan for Science and Technology (NPST) program by King Saud University Project Number 11-INF1830-02.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Atrey, P.K., Alharthi, S., Hossain, M.A. et al. Collective control over sensitive video data using secret sharing. Multimed Tools Appl 73, 1459–1486 (2014). https://doi.org/10.1007/s11042-013-1644-0
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-013-1644-0