Abstract
Polynomial based secret sharing is the art of protecting information and a tool used in areas where a secret has to be distributed among multiple parties. In this method, secret is encrypted into noisy shares and transferred to participants in the group. Decoding of secret is possible only when sufficient number of authorized members in the group, stack their respective shares. In this article, polynomial based secret sharing for audio is proposed that computes a checksum to identify the dishonest participant and also the audio shares generated are of smaller dimension. To achieve this, a polynomial function is defined by considering amplitude values and random values as coefficients. Inclusion of random value as the coefficient of higher degree term in the polynomial makes the audio shares noisy and does not provide any information about the secret. This reduces the overhead of performing preprocessing on original audio before shares are generated. In addition, our proposed method can be used for multi secret sharing. Proposed scheme also facilitates identification of dishonest participant before reconstruction of secret through a trusted entity called combiner.







Similar content being viewed by others
Data availability
Not applicable.
Code availability
Not applicable.
References
Abdelfatah RI (2020) Audio encryption scheme using self-adaptive bit scrambling and two multi chaotic-based dynamic DNA computations. IEEE Access 8:69894–69907. https://doi.org/10.1109/ACCESS.2020.2987197
Abhishek P, Subhash K (2011) Space efficient secret sharing for implicit data security. Inf Sci 181:335–341. https://doi.org/10.1016/j.ins.2010.09.013
Blakley GR (1979) Safeguarding cryptographic keys. In: Proceedings of the AFIPS National Computer Conference, vol 48, pp 313–317
Daniel S, Spyros SM (2005) General access structures in audio cryptography. IEEE International Conference on Electro Information Technology, Lincoln, NE, USA, pp 6. https://doi.org/10.1109/EIT.2005.1627018
Dong X, Lixiang L, Haipeng P, Yixian Y (2017) A secure and efficient scalable secret image sharing scheme with flexible shadow sizes. PLoS One 12:1–17. https://doi.org/10.1371/journal.pone.0168674
En Z, Ming L, Siu-Ming Y, Jiao D, Jun-Zhe Z, Gang-Gang J (2021) Fair hierarchical secret sharing scheme based on smart contract. Inf Sci 546:166–176. https://doi.org/10.1016/j.ins.2020.07.032
Harkeerat K, Pritee K (2020) Privacy preserving remote multi-server biometric authentication using cancelable biometrics and secret sharing. Future Gener Comput Syst 102:30–41. https://doi.org/10.1016/j.future.2019.07.023
Hu W, Wu T, Chen Y, Shen Y, Yuan L (2021) A lossless secret image sharing scheme using a larger finite field. Multimed Tools Appl 80:28731–28743. https://doi.org/10.1007/s11042-021-11104-7
Huan L, Zheng Q, Xuanping Z, Xu W (2011) Auditory cryptography security algorithm with audio shelters. Adv Control Eng Inf Sci-Procedia Eng 15:2695–2699. https://doi.org/10.1016/j.proeng.2011.08.507
Jeonghun C, Sushil KS, Tae WK, Jong HP (2021) Blockchain-empowered cloud architecture based on secret sharing for smart city. J Inf Secur Appl 57:102686. https://doi.org/10.1016/j.jisa.2020.102686
Jian S, Dengzhi L, Xingming S, Fushan W, Yang X (2020) Efficient cloud-aided verifiable secret sharing scheme with batch verification for smart cities. Future Gener Comput Syst 109:450–456. https://doi.org/10.1016/j.future.2018.10.049
Kanso A, Ghebleh M (2018) An efficient lossless secret sharing scheme for medical images. J Vis Commun Image Represent 56:245–255. https://doi.org/10.1016/j.jvcir.2018.09.018
Lake B, Mihailo I, Michel AK (2019) A secure and robust scheme for sharing confidential information in IoT systems. Ad Hoc Netw 92:101762. https://doi.org/10.1016/j.adhoc.2018.09.007
Lakshmi VS, Deepthi S, Deepthi PP (2021) Collusion resistant secret sharing scheme for secure data storage and processing over cloud. J Inf Secur Appl 60:102869. https://doi.org/10.1016/j.jisa.2021.102869
Lein H, Changlu L, Yong L (2015) Fair secret reconstruction in (t, n) secret sharing. J Inf Secur Appl 23:1–7. https://doi.org/10.1016/j.jisa.2015.07.001
Lin CC, Tsai WH (2003) Secret image sharing with capability of share data reduction. Opt Eng 42:2340–2345. https://doi.org/10.1117/1.1588661
Lin CC, Tsai WH (2004) Secret image sharing with steganography and authentication. J Syst Softw 73:405–414. https://doi.org/10.1016/S0164-1212(03)00239-5
Ma Z, Ma Y, Huang X, Zhang M, Liu Y (2020) Applying cheating identifiable secret sharing scheme in multimedia security. J Image Video Proc 2020:42. https://doi.org/10.1186/s13640-020-00529-z
Na W, Junsong F, Jiwen Z, Bharat KB (2018) Source-location privacy full protection in wireless sensor networks. Inf Sci 444:105–121. https://doi.org/10.1016/j.ins.2018.02.064
Naor M, Shamir A (1995) Visual cryptography. In: De Santis A (ed) Advances in cryptology-EUROCRYPT'94, Lecture notes in computer science, vol 950. Springer, Berlin, pp 1–2. https://doi.org/10.1007/BFb0053419
Phiri KK, Ali P, Eneya L, Kim H (2018) Linear (t, n) secret sharing scheme based on single polynomial. Int J Appl Eng Res 13:11600–11605
Prashanti G, Nirupama BM (2020) Polynomial-based secret sharing scheme for text, image and audio. J Inst Eng (India): B 101:609–621. https://doi.org/10.1007/s40031-020-00475-4
Rong Z, Jian JZ, Fang D, Feng QZ (2009) A new image secret sharing scheme to identify cheaters. Comput Stand Interfaces 31:252–257. https://doi.org/10.1016/j.csi.2007.10.012
Shamir A (1979) How to share a secret. Commun ACM 22:612–613. https://doi.org/10.1145/359168.359176
Shivendra S, Shailendra T, Krishn KM, Zhigao Z, Arun KS (2018) Providing security and privacy to huge and vulnerable songs repository using visual cryptography. Multimed Tools Appl 77:11101–11120. https://doi.org/10.1007/s11042-017-5240-6
Shyamalendu K, Bibhas CD (2020) A verifiable secret sharing scheme with combiner verification and cheater identification. J Inf Secur Appl 51:102430. https://doi.org/10.1016/j.jisa.2019.102430
Thien CC, Lin JC (2002) Secret image sharing. Comput Graph 26:765–770. https://doi.org/10.1016/S0097-8493(02)00131-0
Wang R, Shyu S (2007) Scalable secret image sharing. Signal Process Image Commun 22:363–373. https://doi.org/10.1016/j.image.2006.12.012
Xingxing J, Daoshun W, Daxin N, Xiangyang L, Jonathan ZS (2019) A new threshold changeable secret sharing scheme based on the Chinese remainder theorem. Inf Sci 473:13–30. https://doi.org/10.1016/j.ins.2018.09.024
Yang C, Huang S (2010) Constructions and properties of k out of n scalable secret image sharing. Opt Commun 283:1750–1762. https://doi.org/10.1016/j.optcom.2009.12.077
Yang CN, Chen TS, Yu KH, Wang CC (2007) Improvements of image sharing with steganography and authentication. J Syst Softw 80:1070–1076. https://doi.org/10.1016/j.jss.2006.11.022
Yvo D, Shuang H, Jean JQ (1998) Audio and optical cryptography. Springer-Verlag Berlin Heidelberg 1514, pp 392–404
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflicts of interest/competing interests
The authors declare they have no conflicts / competing interests.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Prashanti, G., Bhat, M.N. Cheating identifiable polynomial based secret sharing scheme for audio and image. Multimed Tools Appl 83, 403–423 (2024). https://doi.org/10.1007/s11042-023-15625-1
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-15625-1