Abstract
Two in One Image Secret Sharing Scheme (TiOISSS) is a cryptographic technique which encrypts a secret image into n shares and the shares are decoded in two different stages to reconstruct the secret image. In this paper, an enhanced (k, n) TiOISSS which uses circular shares instead of rectangular shares based on random grids that shares multiple secret images using noisy and meaningful shares is proposed. In addition, to verify the authenticity of the shared secret images, the proposed scheme shares an additional authentication message along with the secret images. Experimental results and performance analysis with 2 and 3 secret images shared demonstrate the effectiveness of proposed scheme compared to existing scheme.












Similar content being viewed by others
References
Alassaf N, Alkazemi B, Gutub A (2017) Applicable light-weight cryptography to secure medical data in IoT systems. J Res Eng Appl Sci (JREAS) 2(2):50–58
Al-Otaibi NA, Gutub AA (2014) 2-Leyer security system for hiding sensitive text data on personal computers. Lect Notes Inform Theory 2(2):151–157
Arumugam S, Lakshmanan R, Nagar AK (2014) On (k,n) visual cryptography scheme. J Des Codes Crypt 71(1):153–162
Cao Y, Zhou Z, Sun X, Gao C (2018) Coverless Information Hiding Based on the Molecular Structure Images of Material. J Comput Mater Continua Tech Sci Press 54(2):197–207
Chen T-H, Tsao K-H (2011) Threshold visual secret sharing by random grids. J Syst Softw 84(7):1197–1208
Chen T-H, Lin K-S, Lin C-H (2017) On the design of a two-decoding option image secret sharing scheme. J Multimed Tools Appl. https://doi.org/10.1007/s11042-017-4680-3
Chiu P-L, Lee K-H (2015) User-friendly threshold visual cryptography with complementary cover images. J Signal Process, Elsevier 108:476–488
Feng J-B, Wu H-C, Tsai C-S, Chang Y-F, Chu Y-P (2008) Visual secret sharing for multiple secrets. J Pattern Recognit 41(12):3272–3581
Gutub A, Al-Juaid N, Khan E Counting-based secret sharing technique for multimedia applications. J Multimed Tools Appl. https://doi.org/10.1007/s11042-017-5293-6,2017
Gutub AA-A, Khan EA (2011) Using subthreshold SRAM to design low-power crypto hardware. Int J New Comput Architectures Appl (IJNCAA) 1(2):474–483
Gutub AA-A, Khan FA-A (2012) Hybrid crypto hardware utilizing symmetric-key & public-key cryptosystems. International conference on advanced computer science applications and technologies - ACSAT2012, pp 26–28
Gutub AA-A, Tabakh A-A, Al-Qahtani A, Amin A (2013) Serial vs. parallel elliptic curve crypto processor designs. IADIS International Conference Applied Computing 2013, pp 67–74
Jian X, Wei L, Zhang Y, Wang A, Zhou F, Gao C-z (2018) Dynamic fully homomorphic encryption-based Merkle tree for lightweight streaming authenticated data structures. J Netw Comput Appl 107:113–124
Lee J-S, Chang C-C, Huynh N-T, Tsai H-Y (2015) Preserving user-friendly shadow and high-contrast quality for multiple visual secret sharing technique. J Digit Signal Process 40:131–139
Li J, Lin Q, Yu C, Ren X, Li P (2016) A QDCT- and SVD-based color image watermarking scheme using an optimized encrypted binary computer-generated hologram. J Soft Comput 22(1):47–65
Li Y, Wang G, Lin N, Wang Q (2018) Distance metric optimization driven convolutional neural network for age invariant face recognition. J Pattern Recognit 75:51–62
Li P, Yang C-N, Kong Q A novel two-in-one image secret sharing scheme based on perfect black visual cryptography. J Real-Time Image Proc. https://doi.org/10.1007/s11554-016-0621-z,2016
Lia P, Maa P-J, Sua X-H, Yang C-N (2012) Improvements of a two-in-one image secret sharing scheme based on gray mixing model. J Vis Commun Image Represent 23(3):441–453
Lin S-J, Lin J-C (April 2007) VCPSS:a two-in-one two-decoding options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches. J Pattern Recognit Lett 40(12):3652–3666
Lin T-L, Horng S-J, Lee K-H, Chiu P-L, Kao T-W, Chen Y-H, Run R-S, Lai J-L, Chen R-J (2010) A Novel visual secret sharing for multiple secrets without pixel expansion. J Expert Syst Appl 37(12):7858–7869
Lin K-S, Lin C-H, Chen T-H (2014) Distortionless visual multi-secret sharing based on random grid. J Inf Sci 288:330–346
Lin C-H, Lee Y-S, Chen T-H (2015) Friendly progressive random-grid-based visual secret sharing with adaptive contrast. J Vis Commun Image Represent 33:31–41
Naor M, Shamir A (1994) Visual cryptography. In: De Santis A (ed) Advances in cryptology proceedings of Eurocypto 94. Lecture Notes in Computer Science, vol 950, pp 1–12
Shyu SJ (2009) Image encryption by multiple random grids. J Pattern Recognit 42(7):1582–1596
Sridhar S, Sathishkumar R, Sudha GF (2015) Adaptive halftoned visual cryptography with improved quality and security. J Multimed Tools Appl 74(23):1–20
Srividhya S, Sathishkumar R, Sudha GF (2016) Implementation of TiOISSS with meaningful shadows and with an additional authentication image. J Vis Commun Image Represent 38:284–296
Thien C-C, Lin J-C (2002) Secret image sharing. J Comput Graph 26(5):765–770
Yan X, Liu X, Yang C-N (2015) An enhanced threshold visual secret sharing based on random grids. J Real-Time Image Proc 14(1):61–73
Yang C-N, Ciou C-B (2010) Image secret sharing method with two-decoding- options: lossless recovery and previewing capability. J Image Vision Comput 28(12):1600–1610
Yang C-N, Yang Y-Y (2014) New extended visual cryptography schemes with clearer shadow images. J Inf Sci 271(4):246–263
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Sridhar, S., Sudha, G.F. Circular meaningful shares based (k, n) two in one image secret sharing scheme for multiple secret images. Multimed Tools Appl 77, 28601–28632 (2018). https://doi.org/10.1007/s11042-018-6019-0
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-018-6019-0