Abstract
The goal of the secret sharing is to share a secret information without any leakage to others. In this paper, we proposed a secure mechanism of sharing secret shares of an image between two parties generated via Shamir’s scheme with the help of neural cryptography. Neural cryptography is a new source for public key cryptography schemes which are not based on number theory, and have less computation time and memory complexities. Neural cryptography can be used to generate a common secret key between two parties. Keeping all these in mind, our main focus is to share secret information over a public channel with less computation power. In the case of neural cryptography, both the parties receive an identical input vector, generate an output bit and are trained based on the output bit. The dynamics of the two networks and their weight vectors is found to exhibit a synchronization state with identical weights. These identical weights are acts as a common key between two parties. The proposed scheme is secure and does not reveal secret information.
Similar content being viewed by others
References
Al-Ghamdi M, Al-Ghamdi M, Gutub A (2019) Security enhancement of shares generation process for multimedia counting-based secret-sharing technique. Multimed Tools Appl 78(12):16283–16310
Bao L, Yi S, Zhou Y (2017) Combination of sharing matrix and image encryption for lossless (k, n)-secret image sharing. IEEE Trans Image Process 26(12):5618–5631
Boyd C, Mathuria A (2013) Protocols for authentication and key establishment. Springer Science & Business Media
Chen CC, Chang CC (2007) Secret image sharing using quadratic residues. In: Third international conference on intelligent information hiding and multimedia signal processing (IIH-MSP 2007), vol 1. IEEE, pp 515–518
Chen T, Lee YS, Huang WL, Juan JST, Chen YY, Li MJ (2013) Quality-adaptive visual secret sharing by random grids. J Syst Softw 86(5):1267–1274
Demuth HB, Beale MH, De Jess O, Hagan MT (2014) Neural network design. Martin Hagan
Deshmukh M, Nain N, Ahmed M (2016) An (n, n)-multi secret image sharing scheme using boolean XOR and modular arithmetic. In: 2016 IEEE 30th international conference on advanced information networking and applications (AINA). IEEE, pp 690–697
Deshmukh M, Nain N, Ahmed M (2016) Enhanced modulo based multi secret image sharing scheme. Springer, Cham, pp 212–224
Deshmukh M, Nain N, Ahmed M (2017) A novel approach for sharing multiple color images by employing Chinese remainder theorem. J Vis Commun Image Represent 49:291–302
Deshmukh M, Nain N, Ahmed M (2018) Efficient and secure multi secret sharing schemes based on boolean XOR and arithmetic modulo. Multimed Tools Appl 77(1):89–107
Deshmukh M, Nain N, Ahmed M (2019) Secret sharing scheme based on binary trees and Boolean operation. Knowl Inf Syst 60(3):1377–1396
Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inform Theory 22(6):644–654
Forouzan BA, Mukhopadhyay D (2011) Cryptography and network security (Sie). McGraw-Hill Education
Ghasemi R, Safi A, Hadian Dehkordi M (2018) Efficient multisecret sharing scheme using new proposed computational security model. Int J Commun Syst 31 (1):e3399
Gupta BB (ed) (2018) Computer and cyber security: principles, algorithm, applications, and perspectives. CRC Press, Boca Raton
Gupta B, Agrawal DP, Yamaguchi S (eds) (2016) Handbook of research on modern cryptographic solutions for computer and cyber security. IGI global, Pennsylvania
Gutub A, Al-Ghamdi M (2019) Image based steganography to facilitate improving counting-based secret sharing. 3D Res 10(1):6
Gutub A, Al-Juaid N, Khan E (2019) Counting-based secret sharing technique for multimedia applications. Multimed Tools Appl 78(5):5591–5619
Hamza R, Hassan A, Patil AS (2019) A lightweight secure IoT surveillance framework based on DCT-DFRT algorithms. In: International conference on machine learning for cyber security. Springer, Cham, pp 271–278
Hamza R, Yan Z, Muhammad K, Bellavista P, Titouna F (2019) A privacy-preserving cryptosystem for IoT E-healthcare. Information Sciences
Hertz JA, Krogh AS, Palmer RG (1991) Introduction to the theory of neural computation
Kanter I, Kinzel W, Kanter E (2002) Secure exchange of information by synchronization of neural networks. EPL (Europhys Lett) 57(1):141
Klimov A, Mityagin A, Shamir A (2002) Analysis of neural cryptography. In: International conference on the theory and application of cryptology and information security. Springer, Berlin, pp 288–298
Mislovaty R, Klein E, Kanter I, Kinzel W (2004) Security of neural cryptography. In: Proceedings of the 2004 11th IEEE international conference on electronics, circuits and systems, 2004. ICECS 2004. IEEE, pp 219–221
Mu N, Liao X (2013) An approach for designing neural cryptography. In: International symposium on neural networks. Springer, Berlin, pp 99–108
Rajput M, Deshmukh M (2016) Secure (n, n + 1)-multi secret image sharing scheme using additive modulo. Procedia Comput Sci 89:677–683
Rajput M, Deshmukh M (2016) A technique to share multiple secret images. Inform Process 10(3):2016. arXiv:1611.09261.l
Rajput M, Deshmukh M, Nain N (2016) A novel approach for concealing image by utilizing the concept of secret sharing scheme and steganography. In: 2016 International conference on information technology (ICIT). IEEE, pp 51–56
Rajput M, Deshmukh M, Nain N, Ahmed M (2018) Securing data through steganography and secret sharing schemes: trapping and misleading potential attackers. IEEE Consum Electron Mag 7(5):40–45
Reyes OM, Kopitzke I, Zimmermann KH (2009) Permutation parity machines for neural synchronization. J Phys A: Math Theor 42(19):195002
Riad K, Hamza R, Yan H (2019) Sensitive and energetic IoT access control for managing cloud electronic health records. IEEE Access 7:86384–86393
Rosen-Zvi M, Klein E, Kanter I, Kinzel W (2002) Mutual learning in a tree parity machine and its application to cryptography. Phys Rev E 66(6):066135
Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613
Shivani S (2018) Multi secret sharing with unexpanded meaningful shares. Multimed Tools Appl 77(5):6287–6310
Stallings W (2006) Cryptography and network security, 4/E. Pearson Education India
Stallings W (2017) Cryptography and network security: principles and practice. Pearson, Upper Saddle River, pp 92–95
Stergiou C, Psannis KE, Kim BG, Gupta B (2018) Secure integration of IoT and cloud computing. Futur Gener Comput Syst 78:964–975
Stinson DR (2005) Cryptography: theory and practice. Chapman and Hall/CRC
Tewari A, Gupta B (2017) Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags. J Supercomput 73(3):1085–1102
Tsai DS, Chen T, Horng G (2008) On generating meaningful shares in visual secret sharing scheme. Imag Sci J 56(1):49–55
Volkmer M, Wallner S (2005) Tree parity machine rekeying architectures for embedded security. IACR Cryptology ePrint Archive, 2005, p 235
Yu C, Li J, Li X, Ren X, Gupta B (2018) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77(4):4585
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Gupta, M., Gupta, M. & Deshmukh, M. Single secret image sharing scheme using neural cryptography. Multimed Tools Appl 79, 12183–12204 (2020). https://doi.org/10.1007/s11042-019-08454-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-019-08454-8