Abstract
In a secret image sharing (SIS) scheme, a dealer (the data owner or a trusted third-party) encodes a secret image into some share images and distributes them among some participants such that each participant receives exactly one share. Most of the secret image sharing schemes assume a trusted dealer and participants. They do not use any verification of the share images while they are presented for secret reconstruction. In this article, we propose a verifiable multi-secret image sharing scheme using Boolean operations and a secure hash function. We consider n secret images for sharing and convert each secret image to a complete noisy image by using a secure hash function, XOR operations, and a specially designed pseudo-random image-matrix generator function. Then, we use XOR operations to generate the share images. The hash function calls are chained in a unique way to enable reconstruction and verification at a low cost for the secret images. The use of hash function also ensures that secrecy of share images and secret images remains consistent. The experimental results and security analysis prove that the scheme is secure and verifiable.


















Similar content being viewed by others
References
Chattopadhyay AK, Ghosh D, Maitra P, Nag A, Saha HN (2018) A verifiable (n, n) secret image sharing scheme using XOR operations. In: Proceedings of 9th IEEE Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), pages 1025β1031. IEEE
Chattopadhyay AK, Maitra P, Saha HN, Nag A (2018) A verifiable multi-secret sharing scheme with elliptic curve cryptography. In: Proceedings of the 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), pages 1374β1379. IEEE
Chen C-C, Wu W-J (2014) A secure Boolean-based multi-secret image sharing scheme. J Syst Softw 92:107β114
Chen C-C, Wu W-J, Chen J-L (2016) Highly efficient and secure multi-secret image sharing scheme. Multimedia Tools and Applications 75(12):7113β7128
Chen D, Lu W, Xing W, Wang N (2019) An efficient verifiable threshold multi-secret sharing scheme with different stages. IEEE Access 7:107104β107110
Chen T-H, Wu C-S (2011) Efficient multi-secret image sharing based on Boolean operations. Signal Process 91(1):90β97
Chen Y-C, Tsai D-S, Horng G (2013) Visual secret sharing with cheating prevention revisited. Digital Signal Processing 23(5):1496β1504
Chen Y-R, Chen L-H (2017) Region image sharing with various secrecy levels. Multimedia Tools and Applications 76(2):1721β1734
Chor B, Goldwasser S, Micali S, Awerbuch B (1985) Verifiable secret sharing and achieving simultaneity in the presence of faults. In: Proceedings of 26th Annual Symposium on Foundations of Computer Science (SFCS 1985), pages 383β395. IEEE
Das A, Adhikari A (2010) An efficient multi-use multi-secret sharing scheme based on hash function. Applied Mathematics Letters 23(9):993β996
Dehkordi MH, Mashhadi S (2008) An efficient threshold verifiable multi-secret sharing. Computer Standards & Interfaces 30(3):187β190
Dehkordi MH, Mashhadi S (2008) New efficient and practical verifiable multi-secret sharing schemes. Information Sciences 178(9):2262β2274
Dehkordi MH, Mashhadi S (2008) Verifiable secret sharing schemes based on non-homogeneous linear recursions and elliptic curves. Computer Communications 31(9):1777β1784
Dehkordi MH, Oraei H (2019) How to construct a verifiable multi-secret sharing scheme based on graded encoding schemes. IET Inf Secur 13(4):343β351
dela Cruz R, Wang H (2013) Cheating-immune secret sharing schemes from codes and cumulative arrays. Cryptography and Communications 5(1):67β83
Deshmukh M, Nain N, Ahmed M (2017) A novel approach for sharing multiple color images by employing Chinese remainder theorem. Journal of Visual Communication and Image Representation 49:291β302
Deshmukh M, Nain N, Ahmed M (2018) Efficient and secure multi secret sharing schemes based on Boolean XOR and arithmetic modulo. Multimedia Tools and Applications 77(1):89β107
Faraoun KM (2017) Design of a new efficient and secure multi-secret images sharing scheme. Multimedia Tools and Applications 76(5):6247β6261
Guo C, Zhang H, Fu Z, Feng B, Li M (2018) A novel proactive secret image sharing scheme based on LISS. Multimedia Tools and Applications 77(15):19569β19590
Harn L, Fuyou M, Chang C-C (2013) Verifiable secret sharing based on the Chinese remainder theorem. Security and Communication Networks 7 (6):950β957
Harn L, Lin C (2009) Detection and identification of cheaters in (t, n) secret sharing scheme. Des Codes Crypt 52(1):15β24
Hu C, Liao X, Cheng X (2012) Verifiable multi-secret sharing based on LFSR sequences. Theoretical Computer Science 445:52β62
Kabirirad S, Eslami Z (2018) A (t, n)-multi secret image sharing scheme based on Boolean operations. Journal of Visual Communication and Image Representation 57:39β47
Kabirirad S, Eslami Z (2019) Improvement of (n, n)-multi-secret image sharing schemes based on Boolean operations. Journal of Information Security and Applications 47:16β27
Kandar S, Dhara BC (2020) A verifiable secret sharing scheme with combiner verification and cheater identification. Journal of Information Security and Applications 51:102430
Kanso A, Ghebleh M (2018) An efficient lossless secret sharing scheme for medical images. J Vis Commun Image Represent 56:245β255
Lin P-Y, Wang R-Z, Chang Y-J, Fang W-P (2015) Prevention of cheating in visual cryptography by using coherent patterns. Inf Sci 301:61β74
Lin T-L, Horng S-J, Lee K-H, Chiu P-L, Kao T-W, Chen Y-H, Run R-S, Lai J-L, Chen R-J (2010) A novel visual secret sharing scheme for multiple secrets without pixel expansion. Expert Syst Appl 37(12):7858β7869
Liu Y, Harn L, Chang C-C (2015) A novel verifiable secret sharing mechanism using theory of numbers and a method for sharing secrets. International Journal of Communication Systems 28(7):1282β1292
Liu Y, Yang C, Wang Y, Zhu L, Ji W (2018) Cheating identifiable secret sharing scheme using symmetric bivariate polynomial. Inf Sci 453:21β29
Liu Y-X, Sun Q-D, Yang C-N (2018) (k,n) secret image sharing scheme capable of cheating detection. EURASIP Journal on Wireless Communications and Networking 72:1β6
Mashhadi S, Dehkordi MH (2015) Two verifiable multi secret sharing schemes based on nonhomogeneous linear recursion and LFSR public-key cryptosystem. Inf Sci 294:31β40
Nag A, Singh JP, Singh AK (2019) An efficient Boolean based multi-secret image sharing scheme. Multimed Tools Appl
Ou D, Sun W, Wu X (2015) Non-expansible XOR-based visual cryptography scheme with meaningful shares. Signal Process 108:604β621
Ou D, Ye L, Sun W (2015) User-friendly secret image sharing scheme with verification ability based on block truncation coding and error diffusion. Journal of Visual Communication and Image Representation 29:46β60
Prasetyo H, Guo J-M (2019) A note on multiple secret sharing using Chinese remainder theorem and exclusive-OR. IEEE Access 7:37473β37497
Prasetyo H, Hsia C-H (2019) Lossless progressive secret sharing for grayscale and color images. Multimedia Tools and Applications 78:24837β24862
Rajabi B, Eslami Z (2019) A verifiable threshold secret sharing scheme based on lattices. Inf Sci 501:655β661
Reyad O, Kotulski Z, Abd-Elhafiez WM (2016) Image encryption using chaos-driven elliptic curve pseudo-random number generators. Applied Mathematics & Information Sciences 10(4):1283β1292
Shao J (2014) Efficient verifiable multi-secret sharing scheme based on hash function. Inf Sci 278:104β109
Sheikhi-Garjan M, Bahramian M, Doche C (2019) Threshold verifiable multi-secret sharing based on elliptic curves and Chinese remainder theorem. IET Inf Secur 13(3):278β284
Shivani S (2018) Multi secret sharing with unexpanded meaningful shares. Multimedia Tools and Applications 77(5):6287β6310
Singh P, Raman B, Misra M (2018) A (n, n) threshold non-expansible XOR based visual cryptography with unique meaningful shares. Signal Process 142:301β319
Thien C-C, Lin J-C (2002) Secret image sharing. Computers & Graphics 26(5):765β770
Verma OP, Jain N, Pal SK (2020) A hybrid-based verifiable secret sharing scheme using Chinese remainder theorem. Arabian Journal for Science and Engineering 45:2395β2406
Wang D, Zhang L, Ma N, Li X (2007) Two secret sharing schemes based on Boolean operations. Pattern Recogn 40(10):2776β2785
Wu K-S (2013) A secret image sharing scheme for light images. EURASIP Journal on Advances in Signal Processing 2013(1):49
Wu T-Y, Tseng Y-M (2011) A pairing-based publicly verifiable secret sharing scheme. J Syst Sci & Complexity 24(1):186β194
Yang C-C, Chang T-Y, Hwang M-S (2004) A (t,n) multi-secret sharing scheme. Appl Math Comput 151(2):483β490
Zhao J, Zhang J, Zhao R (2007) A practical verifiable multi-secret sharing scheme. Computer Standards & Interfaces 29(1):138β141
Zhao R, Zhao J, Dai F, Zhao F (2009) A new image secret sharing scheme to identify cheaters. Computer Standards & Interfaces 31(1):252β257
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisherβs note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Chattopadhyay, A.K., Nag, A., Singh, J.P. et al. A verifiable multi-secret image sharing scheme using XOR operation and hash function. Multimed Tools Appl 80, 35051β35080 (2021). https://doi.org/10.1007/s11042-020-09174-0
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-09174-0