Abstract
Natural share-based secret image sharing (SIS) scheme is an important security mechanism used to secure medical images such as X-rays, MRIs, and CT scans. The most commonly used SIS method in state-of-the-art secret sharing schemes is based on random shares, which may raise suspicion for the attacker, even though they do not reveal any sensitive information. To mislead the attacker, it is necessary to generate shares that cannot be identified as secret shares. Existing works on natural shares are often complex, using operations such as Fractal Matrix, Turtle Shell, Hybrid Fractal Matrix, and others. In this research, a natural share-based lightweight (n, n) single SIS scheme using LSB stuffing for medical images is proposed. The suggested technique uses a lightweight operation called Boolean XOR and LSB stuffing for share generation and secret reconstruction, which are less sophisticated than the operations used in existing schemes. The secret image is used to generate n different natural shared images, and all n natural shared images are necessary to rebuild the original secret image. The suggested approach generates natural shares rather than random ones, which misleads the attacker into interpreting them as non-confidential information. This makes the natural shares less vulnerable to attack and helps keep them safe. Experimental findings show that the shares produced by the suggested method are visually appealing and do not disclose any confidential information. Even if the attacker knows that the natural shares contain confidential information, the secret cannot be reconstructed until the attacker has all the natural shares. Moreover, the secret won’t be reconstructed at the receiver end if any of the natural shares get corrupted. However, the suggested scheme has a limitation that it only provides lossless recovery for shares having a value \(n \ge 4\).
Similar content being viewed by others
References
Pandey D et al (2022) Distributed biomedical scheme for controlled recovery of medical encrypted images. IRBM 43(3):151–160
Kiran P, Parameshachari BD (2022) Resource optimized selective image encryption of medical images using multiple chaotic systems. Microprocess Microsyst 91:104546
Chen J et al (2022) Snis: a signal noise separation-based network for post-processed image forgery detection. IEEE Trans Circuits Syst Video Technol
Rajput M, Deshmukh M, Nain N (2016) A novel approach for concealing image by utilizing the concept of secret sharing scheme and steganography. In: International Conference on Information Technology (ICIT). IEEE
Loan NA et al (2017) Hiding electronic patient record (EPR) in medical images: a high capacity and computationally efficient technique for e-healthcare applications. J Biomed Inform 73:125–136
Parah SA et al (2017) Hiding clinical information in medical images: a new high capacity and reversible data hiding technique. J Biomed Inform 66:214–230
Sajjad M et al (2017) Mobile-cloud assisted framework for selective encryption of medical images with steganography for resource-constrained devices. Multimed Tools Appl 76(3):3519–3536
Rajput M et al (2018) Securing data through steganography and secret sharing schemes: trapping and misleading potential attackers. IEEE Consumer Electron Mag 7(5):40–45
Bhardwaj R (2021) Hiding patient information in medical images: an encrypted dual image reversible and secure patient data hiding algorithm for E-healthcare. Multimed Tools Appl 1–28
Tan J et al (2021) Channel attention image steganography with generative adversarial networks. IEEE Trans Netw Sci Eng 9(2):888–903
Mashhadi S, Saeedi Z (2023) A (t, n)-Secret image sharing with steganography based on Rook polynomial and LWE problem. Multimed Tools Appl 1–21
Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613
Blakley RG (1979) Safeguarding cryptographic keys. Managing requirements knowledge, International Workshop on. IEEE Computer Society
Deshmukh M, Nain N, Ahmed M (2016) An (n, n)-multi secret image sharing scheme using Boolean XOR and modular arithmetic. In: 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA). IEEE
Rajput M, Deshmukh M (2016) Secure (n, n+ 1)-multi secret image sharing scheme using additive modulo. Procedia Comput Sci 89:677–683
Shivani S, Rajitha B, Agarwal S (2017) XOR based continuous-tone multi secret sharing for store-and-forward telemedicine. Multimed Tools Appl 76(3):3851–3870
Chen C-C, Chen J-L (2017) A new Boolean-based multiple secret image sharing scheme to share different sized secret images. J Inf Secur Appl 33:45–54
Deshmukh M, Nain N, Ahmed M (2018) Efficient and secure multi secret sharing schemes based on Boolean XOR and arithmetic modulo. Multimed Tools Appl 77(1):89–107
Deshmukh M, Nain N, Ahmed M (2019) Secret sharing scheme based on binary trees and Boolean operation. Knowl Inf Syst 60(3):1377–1396
Nag A, Singh JP, Singh AK (2020) An efficient Boolean based multi-secret image sharing scheme. Multimed Tools Appl 79(23):16219–16243
Huang B-Y, Juan JS-T (2020) Flexible meaningful visual multi-secret sharing scheme by random grids. Multimed Tools Appl 79(11):7705–7729
Latif A, Mehrnahad Z, Ahmadabadi JZ (2022) A new scheme for lossless meaningful visual secret sharing by using XOR properties. Authorea Preprints
Thien C-C, Lin J-C (2002) Secret image sharing. Comput Graph 26(5):765–770
Ding W et al (2018) Polynomial-based secret image sharing scheme with fully lossless recovery. Int J Digit Crime Forensics (IJDCF) 10(2):120–136
Chang C-C, Huynh N-T, Le H-D (2014) Lossless and unlimited multi-image sharing based on Chinese remainder theorem and Lagrange interpolation. Signal Process 99:159–170
Guo C et al (2016) A multi-threshold secret image sharing scheme based on the generalized Chinese reminder theorem. Multimed Tools Appl 75(18):11577–11594
Deshmukh M, Nain N, Ahmed M (2017) A novel approach for sharing multiple color images by employing Chinese Remainder Theorem. J Vis Commun Image Represent 49:291–302
Prasetyo H, Guo J-M (2019) A note on multiple secret sharing using Chinese remainder theorem and exclusive-OR. IEEE Access 7:37473–37497
Rawat AS, Deshmukh M, Singh M (2023) A novel multi secret image sharing scheme for different dimension secrets. Multimed Tools Appl 1–37
Pande D et al (2023) Single secret sharing scheme using chinese remainder theorem, modified Shamir’s scheme and XOR operation. Wirel Pers Commun 1–29
Gupta M, Gupta M, Deshmukh M (2020) Single secret image sharing scheme using neural cryptography. Multimed Tools Appl 79:12183–12204
Gutub A, Al-Juaid N, Khan E (2019) Counting-based secret sharing technique for multimedia applications. Multimed Tools Appl 78:5591–5619
Kanso A, Ghebleh M (2018) An efficient lossless secret sharing scheme for medical images. J Vis Commun Image Represent 56:245–255
Mhala NC, Pais AR (2019) An improved and secure visual secret sharing (VSS) scheme for medical images. In: 2019 11th International Conference on Communication Systems and Networks (COMSNETS). IEEE
Tiankai S et al (2020) A robust authentication algorithm for medical images based on fractal brownian model and visual cryptography. Sci Program 1–11
Sarosh P et al (2021) Secret sharing-based personal health records management for the internet of health things. Sustain Cities Soc 74:103129
Holla MR, Pais AR (2022) High-performance medical image secret sharing using super-resolution for CAD systems. Appl Intell 1–17
Sardar MK, Pramanik J, Adhikari A (2023) (t, k, n) Regional secret image sharing over finite fields. Signal Process 109082
Gao K et al (2020) A reversible secret image sharing scheme based on stick insect matrix. IEEE Access 8:130405–130416
Liu Y, Chang C-C, Huang P-C (2019) Security protection using two different image shadows with authentication. Math Biosci Eng 16(4):1914–1932
Chang C-C et al (2020) A maze matrix-based secret image sharing scheme with cheater detection. Sensors 20(13):3802
Liu Y, Chang C-C (2018) A turtle shell-based visual secret sharing scheme with reversibility and authentication. Multimed Tools Appl 77(19):25295–25310
Rawat AS, Deshmukh M, Singh M (2023) QR shares based secret sharing scheme using DWT, random permutation and arithmetic modulo operation for QR secret. In: 10th International Conference on Signal Processing and Integrated Networks (SPIN). IEEE, pp 772–777
Rawat AS, Deshmukh M, Singh M (2023) Meaningful shares based single secret sharing scheme using Chinese remainder theorem and XOR operation. In: 10th International Conference on Signal Processing and Integrated Networks (SPIN). IEEE, pp 597–602
Ulutas M, Ulutas G, Nabiyev VV (2011) Medical image security and EPR hiding using Shamir’s secret sharing scheme. J Syst Softw 84(3):341–353
Lakshmi VS, Deepthi S, Deepthi PP (2021) Collusion resistant secret sharing scheme for secure data storage and processing over cloud. J Inf Secur Appl 60:102869
Chen M, Liao X, Min W (2022) PulseEdit: editing physiological signals in facial videos for privacy protection. IEEE Trans Inf Forensics Secur 17:457–471
Shivani S (2018) Multi secret sharing with unexpanded meaningful shares. Multimed Tools Appl 77(5):6287–6310
Liu Y, Chang C-C (2018) A turtle shell-based visual secret sharing scheme with reversibility and authentication. Multimed Tools Appl 77(19):25295–25310
Liu Y, Chang C-C, Huang P-C (2019) Security protection using two different image shadows with authentication. Math Biosci Eng 16(4):1914–1932
Li X-S et al (2020) A lightweight authenticable visual secret scheme based on turtle shell structure matrix. Multimed Tools Appl 79(1):453–476
Gao K, Horng J-H, Chang C-C (2020) A novel (2, 3) reversible secret image sharing based on fractal matrix. IEEE Access 8:174325–174341
Gao K, Horng J-H, Chang C-C (2021) An authenticatable (2, 3) secret sharing scheme using meaningful share images based on hybrid fractal matrix. IEEE Access 9:50112–50125
Kapadiya VJ, Desai LS, Meghrajani YK (2018) Boolean-based multi secret sharing scheme using meaningful shares. In: 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT). IEEE, pp 840–844
Funding
This research received no specific grant from any funding agency in the public, commercial, or not-for-profit sectors.
Author information
Authors and Affiliations
Contributions
Mr. AR done data collection, design of methodology, implementation, and manuscript preparation. Dr. MD (Corresponding author) and Dr. MS provide suggestions for design of the proposed model and done manuscript checking, analysis of the methodology, and results verification.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflicts of the interest.
Ethical approval
The authors declare that there is no violation of ethical rules, this manuscript have not been copyrighted or published previously.
Human and animal rights
There is no involvement of animals in studies. There is no involvement of human participants in studies.
Informed consent
This article contains chest X-ray image, MRI image, and ultrasound image of human are free to use for commercial and non-commercial purposes and no permission is needed, available at: https://unsplash.com/photos/tHS9j3HWT1s, https://en.wikipedia.org/wiki/File:MRI_Head_Brain_Normal.jpg,https://commons.wikimedia.org/wiki/File:CRL_Crown_rump_length_12_weeks_ecografia_Dr._Wolfgang_Moroder.jpg, other non medical images are also free to use for commercial and non-commercial purposes and no permission is needed.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Rawat, A.S., Deshmukh, M. & Singh, M. Natural share-based lightweight (n, n) single secret image sharing scheme using LSB stuffing for medical images. J Supercomput 79, 19138–19167 (2023). https://doi.org/10.1007/s11227-023-05396-9
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-023-05396-9