Skip to main content
Log in

A novel approach for multilevel multi-secret image sharing scheme

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Multi-secret sharing (MSS) is an effective technique that securely encodes multiple secrets to generate shares and distributes them among the participants in such a way that these shares can be used later to reconstruct the secrets. MSS schemes have a considerable advantage over the single-secret sharing schemes for secure multimedia data transmission. This paper presents a novel secret image sharing approach, namely ‘(nml)-Multilevel Multi-Secret Image Sharing (MMSIS) scheme.’ The proposed MMSIS scheme encodes ‘n’ distinct secret images to generate ‘m’ shares and distributes them among ‘m’ participants allocated to ‘l’ distinct levels. The paper proposes two variants of the MMSIS scheme. The first variant is an \((n,n+1,l)\)-MMSIS scheme which encodes ‘n’ secret images each having a unique level id \(L_k\) into \((n+1)\) shares. The image shares are then distributed among \((n+1)\) participants assigned to ‘\(l=n\)’ different levels. With the increase in level id, the number of shares required to reconstruct the secret image also increases. To reconstruct a secret image of a particular level \(L_k\), all the shares at level \(L_k\) and its preceding levels need to be acquired, which requires the consensus of all participants holding the shares up to level \(L_k\). The second variant, namely extended-MMSIS (EMMSIS) scheme is a generalized (nml) version of the former scheme that allows to generate more shares for a specific secret image at a particular level in accordance with the consensus requirements for its reconstruction. The multilevel structure of the scheme makes it useful for multi-secret distribution in a multilevel organizational structure.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  1. Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613

    Article  MathSciNet  Google Scholar 

  2. Blakley GR (1979) Safeguarding cryptographic keys. In: International Workshop on Managing Requirements Knowledge, Los Alamitos, CA, USA. IEEE Computer Society, p 313

  3. Li L, Yuliang L, Yan X, Liu L, Tan L (2019) Lossless \((k, n)\)-threshold image secret sharing based on the Chinese remainder theorem without auxiliary encryption. IEEE Access 7:75113–75121

    Article  Google Scholar 

  4. Tan L, Yuliang L, Yan X, Liu L, Li L (2019) Weighted secret image sharing for a \((k, n)\) threshold based on the Chinese remainder theorem. IEEE Access 7:59278–59286

    Article  Google Scholar 

  5. Chen D, Wei L, Xing W, Wang N (2019) An efficient verifiable threshold multi-secret sharing scheme with different stages. IEEE Access 7:107104–107110

    Article  Google Scholar 

  6. Ben-Hui Zhang, Yuan-Sheng Tang (2018) On the construction and analysis of verifiable multi-secret sharing based on non-homogeneous linear recursion. J Inf Sci Eng 34(3):749–763

    MathSciNet  Google Scholar 

  7. Chao H-C, Fan T-Y (2017) Xor-based progressive visual secret sharing using generalized random grids. Displays 49:6–15

    Article  Google Scholar 

  8. Kannojia SP, Kumar J (2019) Xor-based unexpanded meaningful visual secret sharing scheme. IJSN 14(1):1–9

    Article  Google Scholar 

  9. Manupriya P, Sinha S, Kumar K (2017) Vsee: video secret sharing encryption technique. In 2017 Conference on Information and Communication Technology (CICT), IEEE, pp 1–6

  10. Deshmukh M, Nain N, Ahmed M (2016) An (n, n)-multi secret image sharing scheme using boolean xor and modular arithmetic. In: 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA), IEEE, pp 690–697

  11. Duseja T, Deshmukh M (2019) Image compression and encryption using Chinese remainder theorem. Multimedia Tools Appl 78(12):16727–16753

    Article  Google Scholar 

  12. Deshmukh M, Nain N, Ahmed M (2019) Secret sharing scheme based on binary trees and Boolean operation. Knowl Inf Syst 60(3):1377–1396

    Article  Google Scholar 

  13. Deshmukh M, Nain N, Ahmed M (2017) A novel approach for sharing multiple color images by employing Chinese remainder theorem. J Vis Commun Image Represent 49:291–302

    Article  Google Scholar 

  14. Gupta M, Gupta M, Deshmukh M (2020) Single secret image sharing scheme using neural cryptography. In: Multimedia Tools and Applications, pp 1–22

  15. Agarwal A, Deshmukh M (2021) 3-d plane based extended Shamir’s secret sharing. Int J Inf Technol 1–4

  16. Thien C-C, Lin J-C (2002) Secret image sharing. Comput Graph 26(5):765–770

    Article  Google Scholar 

  17. Yang C-N, Chen T-S, Kun Hsuan Yu, Wang C-C (2007) Improvements of image sharing with steganography and authentication. J Syst Softw 80(7):1070–1076

    Article  Google Scholar 

  18. Ding W, Liu K, Yan X, Liu L (2018) Polynomial-based secret image sharing scheme with fully lossless recovery. Int J Digit Crime Forensics (IJDCF) 10(2):120–136

    Article  Google Scholar 

  19. Zhou X, Yuliang L, Yan X, Wang Y, Liu L (2018) Lossless and efficient polynomial-based secret image sharing with reduced shadow size. Symmetry 10(7):249

    Article  Google Scholar 

  20. Gong Q, Wang Y, Yan X, Liu L (2019) Efficient and lossless polynomial-based secret image sharing for color images. IEEE Access 7:113216–113222

    Article  Google Scholar 

  21. Chen C-C, Wei-Jie W (2014) A secure boolean-based multi-secret image sharing scheme. J Syst Softw 92:107–114

    Article  Google Scholar 

  22. Deshmukh M, Nain N, Ahmed M (2018) Efficient and secure multi secret sharing schemes based on Boolean XOR and arithmetic modulo. Multimedia Tools Appl 77(1):89–107

    Article  Google Scholar 

  23. Rajput M, Deshmukh M (2016) Secure (n, n+ 1)-multi secret image sharing scheme using additive modulo. Procedia Comput Sci 89:677–683

    Article  Google Scholar 

  24. Meghrajani YK, Desai LS, Mazumdar HS (2019) Secure and efficient arithmetic-based multi-secret image sharing scheme using universal share. J Inf Secur Appl 47:267–274

    Google Scholar 

  25. Lin K-S, Lin C-H, Chen T-H (2014) Distortionless visual multi-secret sharing based on random grid. Inf Sci 288:330–346

    Article  Google Scholar 

  26. Salehi S, Balafar MA (2014) Visual multi secret sharing by cylindrical random grid. J Inf Secur Appl 19(3):245–255

    Google Scholar 

  27. Rajput M, Deshmukh M, Nain N, Ahmed M (2018) Securing data through steganography and secret sharing schemes: trapping and misleading potential attackers. IEEE Consum Electron Mag 7(5):40–45

    Article  Google Scholar 

  28. Chen T-H, Chang-Sian W (2011) Efficient multi-secret image sharing based on boolean operations. Sig Process 91(1):90–97

    Article  Google Scholar 

  29. Ghodosi H, Pieprzyk J, Safavi-Naini R (1998) Secret sharing in multilevel and compartmented groups. In: Australasian Conference on Information Security and Privacy. Springer, pp 367–378

  30. Simmons GJ (1988) How to (really) share a secret. In: Conference on the Theory and Application of Cryptography. Springer, pp 390–448

  31. Lin CH, Lein YD (2009) Ideal perfect multilevel threshold secret sharing scheme. In: 2009 Fifth International Conference on Information Assurance and Security, IEEE, vol 2, pp 118–121

  32. Siva Kumar PV, Kurra RR, Tentu AN, Padmavathi G (2014) Multi-level secret sharing scheme for mobile ad-hoc networks. Int J Adv Netw Appl 6(2):2253

    Google Scholar 

  33. Harn L, Fuyou M (2014) Multilevel threshold secret sharing based on the Chinese remainder theorem. Inf Process Lett 114(9):504–509

    Article  MathSciNet  Google Scholar 

  34. Asmuth C, Bloom J (1983) A modular approach to key safeguarding. IEEE Trans Inf Theory 29(2):208–210

    Article  MathSciNet  Google Scholar 

  35. Mignotte M (1982) How to share a secret. In: Workshop on Cryptography. Springer, pp 371–375

  36. Meng K, Miao F, Huang W, Xiong Y (2019) Tightly coupled multi-group threshold secret sharing based on Chinese remainder theorem. Discrete Appl Math 268:152–163

    Article  MathSciNet  Google Scholar 

  37. Singh N, Naidu TA, Basit A, Venkaiah VC (2016) Sequential secret sharing scheme based on Chinese remainder theorem. In: 2016 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), IEEE, pp 1–6

  38. Basit A, Chaitanya Kumar N, Venkaiah VC, Abdul MS, Naidu TA, Naik W (2017) Multi-stage multi-secret sharing scheme for hierarchical access structure. In: 2017 International Conference on Computing, Communication and Automation (ICCCA), IEEE, pp 557–563

  39. Wang R-Z, Lee Y-K, Huang S-Y, Chia T-L (2007) Multilevel visual secret sharing. In: Second International Conference on Innovative Computing, Information and Control (ICICIC 2007), IEEE, pp 283–283

  40. Koikara R, Paul A, Yoo K-Y (2016) Multilevel threshold secret image sharing based on the Chinese remainder theorem. In: Proceedings of the International Conference on Security and Management (SAM). The Steering Committee of The World Congress in Computer Science, Computer, p 318

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Maroti Deshmukh.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bisht, K., Deshmukh, M. A novel approach for multilevel multi-secret image sharing scheme. J Supercomput 77, 12157–12191 (2021). https://doi.org/10.1007/s11227-021-03747-y

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-021-03747-y

Keywords

Navigation