Skip to main content

Advertisement

Log in

Circular meaningful shares based (k, n) two in one image secret sharing scheme for multiple secret images

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Two in One Image Secret Sharing Scheme (TiOISSS) is a cryptographic technique which encrypts a secret image into n shares and the shares are decoded in two different stages to reconstruct the secret image. In this paper, an enhanced (k, n) TiOISSS which uses circular shares instead of rectangular shares based on random grids that shares multiple secret images using noisy and meaningful shares is proposed. In addition, to verify the authenticity of the shared secret images, the proposed scheme shares an additional authentication message along with the secret images. Experimental results and performance analysis with 2 and 3 secret images shared demonstrate the effectiveness of proposed scheme compared to existing scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Alassaf N, Alkazemi B, Gutub A (2017) Applicable light-weight cryptography to secure medical data in IoT systems. J Res Eng Appl Sci (JREAS) 2(2):50–58

    Google Scholar 

  2. Al-Otaibi NA, Gutub AA (2014) 2-Leyer security system for hiding sensitive text data on personal computers. Lect Notes Inform Theory 2(2):151–157

    Google Scholar 

  3. Arumugam S, Lakshmanan R, Nagar AK (2014) On (k,n) visual cryptography scheme. J Des Codes Crypt 71(1):153–162

    Article  MathSciNet  Google Scholar 

  4. Cao Y, Zhou Z, Sun X, Gao C (2018) Coverless Information Hiding Based on the Molecular Structure Images of Material. J Comput Mater Continua Tech Sci Press 54(2):197–207

    Google Scholar 

  5. Chen T-H, Tsao K-H (2011) Threshold visual secret sharing by random grids. J Syst Softw 84(7):1197–1208

    Article  Google Scholar 

  6. Chen T-H, Lin K-S, Lin C-H (2017) On the design of a two-decoding option image secret sharing scheme. J Multimed Tools Appl. https://doi.org/10.1007/s11042-017-4680-3

    Article  Google Scholar 

  7. Chiu P-L, Lee K-H (2015) User-friendly threshold visual cryptography with complementary cover images. J Signal Process, Elsevier 108:476–488

    Article  Google Scholar 

  8. Feng J-B, Wu H-C, Tsai C-S, Chang Y-F, Chu Y-P (2008) Visual secret sharing for multiple secrets. J Pattern Recognit 41(12):3272–3581

    Article  Google Scholar 

  9. Gutub A, Al-Juaid N, Khan E Counting-based secret sharing technique for multimedia applications. J Multimed Tools Appl. https://doi.org/10.1007/s11042-017-5293-6,2017

  10. Gutub AA-A, Khan EA (2011) Using subthreshold SRAM to design low-power crypto hardware. Int J New Comput Architectures Appl (IJNCAA) 1(2):474–483

    Google Scholar 

  11. Gutub AA-A, Khan FA-A (2012) Hybrid crypto hardware utilizing symmetric-key & public-key cryptosystems. International conference on advanced computer science applications and technologies - ACSAT2012, pp 26–28

  12. Gutub AA-A, Tabakh A-A, Al-Qahtani A, Amin A (2013) Serial vs. parallel elliptic curve crypto processor designs. IADIS International Conference Applied Computing 2013, pp 67–74

  13. Jian X, Wei L, Zhang Y, Wang A, Zhou F, Gao C-z (2018) Dynamic fully homomorphic encryption-based Merkle tree for lightweight streaming authenticated data structures. J Netw Comput Appl 107:113–124

    Article  Google Scholar 

  14. Lee J-S, Chang C-C, Huynh N-T, Tsai H-Y (2015) Preserving user-friendly shadow and high-contrast quality for multiple visual secret sharing technique. J Digit Signal Process 40:131–139

    Article  MathSciNet  Google Scholar 

  15. Li J, Lin Q, Yu C, Ren X, Li P (2016) A QDCT- and SVD-based color image watermarking scheme using an optimized encrypted binary computer-generated hologram. J Soft Comput 22(1):47–65

    Article  Google Scholar 

  16. Li Y, Wang G, Lin N, Wang Q (2018) Distance metric optimization driven convolutional neural network for age invariant face recognition. J Pattern Recognit 75:51–62

    Article  Google Scholar 

  17. Li P, Yang C-N, Kong Q A novel two-in-one image secret sharing scheme based on perfect black visual cryptography. J Real-Time Image Proc. https://doi.org/10.1007/s11554-016-0621-z,2016

  18. Lia P, Maa P-J, Sua X-H, Yang C-N (2012) Improvements of a two-in-one image secret sharing scheme based on gray mixing model. J Vis Commun Image Represent 23(3):441–453

    Article  Google Scholar 

  19. Lin S-J, Lin J-C (April 2007) VCPSS:a two-in-one two-decoding options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches. J Pattern Recognit Lett 40(12):3652–3666

    Article  Google Scholar 

  20. Lin T-L, Horng S-J, Lee K-H, Chiu P-L, Kao T-W, Chen Y-H, Run R-S, Lai J-L, Chen R-J (2010) A Novel visual secret sharing for multiple secrets without pixel expansion. J Expert Syst Appl 37(12):7858–7869

    Article  Google Scholar 

  21. Lin K-S, Lin C-H, Chen T-H (2014) Distortionless visual multi-secret sharing based on random grid. J Inf Sci 288:330–346

    Article  MathSciNet  Google Scholar 

  22. Lin C-H, Lee Y-S, Chen T-H (2015) Friendly progressive random-grid-based visual secret sharing with adaptive contrast. J Vis Commun Image Represent 33:31–41

    Article  Google Scholar 

  23. Naor M, Shamir A (1994) Visual cryptography. In: De Santis A (ed) Advances in cryptology proceedings of Eurocypto 94. Lecture Notes in Computer Science, vol 950, pp 1–12

    Google Scholar 

  24. Shyu SJ (2009) Image encryption by multiple random grids. J Pattern Recognit 42(7):1582–1596

    Article  Google Scholar 

  25. Sridhar S, Sathishkumar R, Sudha GF (2015) Adaptive halftoned visual cryptography with improved quality and security. J Multimed Tools Appl 74(23):1–20

    Google Scholar 

  26. Srividhya S, Sathishkumar R, Sudha GF (2016) Implementation of TiOISSS with meaningful shadows and with an additional authentication image. J Vis Commun Image Represent 38:284–296

    Article  Google Scholar 

  27. Thien C-C, Lin J-C (2002) Secret image sharing. J Comput Graph 26(5):765–770

    Article  Google Scholar 

  28. Yan X, Liu X, Yang C-N (2015) An enhanced threshold visual secret sharing based on random grids. J Real-Time Image Proc 14(1):61–73

    Article  Google Scholar 

  29. Yang C-N, Ciou C-B (2010) Image secret sharing method with two-decoding- options: lossless recovery and previewing capability. J Image Vision Comput 28(12):1600–1610

    Article  Google Scholar 

  30. Yang C-N, Yang Y-Y (2014) New extended visual cryptography schemes with clearer shadow images. J Inf Sci 271(4):246–263

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Srividhya Sridhar.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sridhar, S., Sudha, G.F. Circular meaningful shares based (k, n) two in one image secret sharing scheme for multiple secret images. Multimed Tools Appl 77, 28601–28632 (2018). https://doi.org/10.1007/s11042-018-6019-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-6019-0

Keywords