Skip to main content
Log in

Extending boolean operations-based secret image sharing to compartmented access structure

  • 1187: Recent Advances in Multimedia Information Security: Cryptography and Steganography
  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The methods for sharing a secret image using Boolean operations are good candidates for Visual Secret Sharing (VSS) as limiting pixel expansion and the reconstruction process computational complexity in VSS schemes. The existing Boolean operations-based secret image sharing (SIS) schemes can only handle the sharing of a secret for (kn)-threshold and general access structure. This paper extends the Boolean operations-based SIS scheme for Compartmented access structure. Two construction techniques are proposed to realize the sharing of a secret image into Compartmented access structure. The proposed scheme benefits by having wide applicability with better visual quality of the reconstructed secret and without involving complex computation in the reconstruction process. Formal proofs and experimental results are given to validate the correctness, security and performance of the proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Bhattacharjee T, Maity S, Islam S (2018) Hierarchical secret image sharing scheme in compressed sensing. Signal Processing: Image Communication 61:21–32

    Google Scholar 

  2. Brickell E (1989) Some ideal secret sharing schemes. Journal of Combinatorial Mathematics and Combinatorial Computing 6:105–113

    MathSciNet  MATH  Google Scholar 

  3. Chao KY, Lin JC (2009) Secret image sharing: A boolean-operations based approach combining benefits of polynomial-based and fast approaches. International Journal of Pattern Recognition and Artificial Intelligence 23(2):263–285

    Article  MathSciNet  Google Scholar 

  4. Chen T, Tsao K (2009) Visual secret sharing by random grids revisited. Pattern Recognition 42(9):2203–2217

    Article  MATH  Google Scholar 

  5. Chen TH, Tsao KH (2011) Threshold visual secret sharing by random grids. Journal of Systems and Software 84(7):1197–1208

    Article  Google Scholar 

  6. Guo C, Chang C, Qin C (2012) A hierarchical threshold secret image sharing. Pattern Recognition Letters 33(1):83–91

    Article  Google Scholar 

  7. Iftene S (2005) Compartmented secret sharing based on the chinese remainder theorem. IACR Cryptology ePrint Archive 2005:408

    MATH  Google Scholar 

  8. Jha DP, Kohli R, Gupta A (2016) Proposed encryption algorithm for data security using matrix properties. In: 2016 International conference on innovation and challenges in cyber security (ICICCS-INBUSH). pp 86–90. https://doi.org/10.1109/ICICCS.2016.7542316

  9. Kafri O, Keren E (1987) Encryption of pictures and shapes by random grids. Optics Letters 12(6):377–379

    Article  Google Scholar 

  10. Kohli R, Garg A, Phutela S, Kumar Y, Jain S (2021) An improvised model for securing cloud-based E-healthcare systems. pp 293–310. https://doi.org/10.1007/978-981-15-9897-5_14

  11. Kumar S, Sharma R (2013) Threshold visual secret sharing based on boolean operations. Security and Communication Networks 7(3):653–664

    Article  Google Scholar 

  12. Kumar S, Sharma R (2017) Boolean operations-based visual secret sharing for general access structures. Journal of Discrete Mathematical Sciences and Cryptography 20(5):1069–1090

    Article  MathSciNet  MATH  Google Scholar 

  13. Kumar S, Sharma RK (2012) Improving contrast in random grids based visual secret sharing. International Journal of Security and Its Applications 6(1):9–28

    Google Scholar 

  14. Kumar S, Sharma RK (2013) Recursive informtion hiding of secrets by raqndom grids. Cryptologia 37(2):154–161

    Article  Google Scholar 

  15. Kumar S, Sharma RK (2013) Secret image sharing for general access structures using random grids. International Journal of Computer Applications 83(7):1–8

    Article  Google Scholar 

  16. Kumar S, Sharma RK (2015) Random-grid based region incrementing visual secret sharing. Fundamenta Informaticae 137(3):36–386

    Article  MathSciNet  MATH  Google Scholar 

  17. Martin KM, Simmons GJ, Jackson WA (1991) The geometry of shared secret schemes. Bulletin of the ICA 1:71–88

    MathSciNet  MATH  Google Scholar 

  18. Mohamed FP, Arockia RJP (2016) Threshold secret sharing scheme for compartmented access structures. International Journal of Information Security and Privacy 10(3):1–9

    Article  Google Scholar 

  19. Mohamed FP, Arockia RJP (2017) Hierarchical threshold secret sharing scheme for color images. Multimedia Tools and Applications 76(4):5489–5503

    Article  Google Scholar 

  20. Naor M, Shamir A (1995) Visual cryptography. In: Proceedings of advances in cryptology (EUROCRYPT 94), vol 950. LNCS, Springer, pp 1–12

  21. Pakniat N, Noroozi M, Eslami, Z (2014) Secret image sharing scheme with hierarchical threshold access structure. Journal of Visual Communication and Image Representation 25(5):1093–1101

  22. Shamir A (1979) How to share a secret. Communication of the ACM 22(11):612–613

    Article  MathSciNet  MATH  Google Scholar 

  23. Shyu S (2007) Image encryption by random grids. Pattern Recognition 40(3):1014–1031

    Article  MATH  Google Scholar 

  24. Shyu S (2009) Image encryption by multiple random grids. Pattern Recognition 42(7):1582–1596

    Article  MATH  Google Scholar 

  25. Shyu SJ (2013) Visual cryptograms of random grids for general access structures. IEEE Transactions On Circuits And Systems For Video Technology 23(3):414–424

    Article  Google Scholar 

  26. Simmons G (1990) How to (really) share a secret. In: Advances in cryptology-CRYPTO, vol 403. LNCS, Springer, pp 390–448

  27. Tassa T (2007) Hierarchical threshold secret sharing. Journal of Cryptology 20(2):237–264

    Article  MathSciNet  MATH  Google Scholar 

  28. Tassa T (2009) Multipartite secret sharing by bivariate interpolation. Journal of Cryptology 22(2):227–258

    Article  MathSciNet  MATH  Google Scholar 

  29. Trujillo AE, Miyatake MN, Meana HP (2014) New condition for hierarchical secret image sharing scheme. In: IEEE 28th international conference on advanced information networking and applications. pp 240–244

  30. Wang D, Zhang L, Ma N, Li X (2007) Two secret sharing schemes based on boolean operations. Pattern Recognition 40(10):2776–2785

    Article  MATH  Google Scholar 

  31. Wang X, Xiang C, Fu F (2017) Secret sharing schemes for compartmented access structures. Crytptography Communication 9:625–635

    Article  MathSciNet  MATH  Google Scholar 

  32. Wu Z, Liu Y, Jia X (2020) A novel hierarchical secret image sharing scheme with multi-group joint management. Mathematics 8(3):1–12

    Article  Google Scholar 

  33. Yang C, Li P, Wu X, Cai S (2015) Reducing shadow size in essential secret image sharing by conjunctive hierarchical approach. Signal Processing: Image Communication 31:1–9

    Google Scholar 

  34. Yu Y, Wang M (2011) A probabilistic secret sharing scheme for a compartmented access structure. In: Information and communications security, vol 7043. LNCS, Springer, Berlin, pp 136–142

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sachin Kumar.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kumar, S. Extending boolean operations-based secret image sharing to compartmented access structure. Multimed Tools Appl 82, 22063–22082 (2023). https://doi.org/10.1007/s11042-021-11554-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-11554-z

Keywords

Navigation