Skip to main content
Log in

Natural share-based lightweight (nn) single secret image sharing scheme using LSB stuffing for medical images

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Natural share-based secret image sharing (SIS) scheme is an important security mechanism used to secure medical images such as X-rays, MRIs, and CT scans. The most commonly used SIS method in state-of-the-art secret sharing schemes is based on random shares, which may raise suspicion for the attacker, even though they do not reveal any sensitive information. To mislead the attacker, it is necessary to generate shares that cannot be identified as secret shares. Existing works on natural shares are often complex, using operations such as Fractal Matrix, Turtle Shell, Hybrid Fractal Matrix, and others. In this research, a natural share-based lightweight (nn) single SIS scheme using LSB stuffing for medical images is proposed. The suggested technique uses a lightweight operation called Boolean XOR and LSB stuffing for share generation and secret reconstruction, which are less sophisticated than the operations used in existing schemes. The secret image is used to generate n different natural shared images, and all n natural shared images are necessary to rebuild the original secret image. The suggested approach generates natural shares rather than random ones, which misleads the attacker into interpreting them as non-confidential information. This makes the natural shares less vulnerable to attack and helps keep them safe. Experimental findings show that the shares produced by the suggested method are visually appealing and do not disclose any confidential information. Even if the attacker knows that the natural shares contain confidential information, the secret cannot be reconstructed until the attacker has all the natural shares. Moreover, the secret won’t be reconstructed at the receiver end if any of the natural shares get corrupted. However, the suggested scheme has a limitation that it only provides lossless recovery for shares having a value \(n \ge 4\).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Pandey D et al (2022) Distributed biomedical scheme for controlled recovery of medical encrypted images. IRBM 43(3):151–160

    Article  Google Scholar 

  2. Kiran P, Parameshachari BD (2022) Resource optimized selective image encryption of medical images using multiple chaotic systems. Microprocess Microsyst 91:104546

    Article  Google Scholar 

  3. Chen J et al (2022) Snis: a signal noise separation-based network for post-processed image forgery detection. IEEE Trans Circuits Syst Video Technol

  4. Rajput M, Deshmukh M, Nain N (2016) A novel approach for concealing image by utilizing the concept of secret sharing scheme and steganography. In: International Conference on Information Technology (ICIT). IEEE

  5. Loan NA et al (2017) Hiding electronic patient record (EPR) in medical images: a high capacity and computationally efficient technique for e-healthcare applications. J Biomed Inform 73:125–136

    Article  Google Scholar 

  6. Parah SA et al (2017) Hiding clinical information in medical images: a new high capacity and reversible data hiding technique. J Biomed Inform 66:214–230

    Article  Google Scholar 

  7. Sajjad M et al (2017) Mobile-cloud assisted framework for selective encryption of medical images with steganography for resource-constrained devices. Multimed Tools Appl 76(3):3519–3536

    Article  Google Scholar 

  8. Rajput M et al (2018) Securing data through steganography and secret sharing schemes: trapping and misleading potential attackers. IEEE Consumer Electron Mag 7(5):40–45

    Article  Google Scholar 

  9. Bhardwaj R (2021) Hiding patient information in medical images: an encrypted dual image reversible and secure patient data hiding algorithm for E-healthcare. Multimed Tools Appl 1–28

  10. Tan J et al (2021) Channel attention image steganography with generative adversarial networks. IEEE Trans Netw Sci Eng 9(2):888–903

    Article  MathSciNet  Google Scholar 

  11. Mashhadi S, Saeedi Z (2023) A (t, n)-Secret image sharing with steganography based on Rook polynomial and LWE problem. Multimed Tools Appl 1–21

  12. Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613

    Article  MathSciNet  MATH  Google Scholar 

  13. Blakley RG (1979) Safeguarding cryptographic keys. Managing requirements knowledge, International Workshop on. IEEE Computer Society

  14. Deshmukh M, Nain N, Ahmed M (2016) An (n, n)-multi secret image sharing scheme using Boolean XOR and modular arithmetic. In: 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA). IEEE

  15. Rajput M, Deshmukh M (2016) Secure (n, n+ 1)-multi secret image sharing scheme using additive modulo. Procedia Comput Sci 89:677–683

    Article  Google Scholar 

  16. Shivani S, Rajitha B, Agarwal S (2017) XOR based continuous-tone multi secret sharing for store-and-forward telemedicine. Multimed Tools Appl 76(3):3851–3870

    Article  Google Scholar 

  17. Chen C-C, Chen J-L (2017) A new Boolean-based multiple secret image sharing scheme to share different sized secret images. J Inf Secur Appl 33:45–54

    Google Scholar 

  18. Deshmukh M, Nain N, Ahmed M (2018) Efficient and secure multi secret sharing schemes based on Boolean XOR and arithmetic modulo. Multimed Tools Appl 77(1):89–107

    Article  Google Scholar 

  19. Deshmukh M, Nain N, Ahmed M (2019) Secret sharing scheme based on binary trees and Boolean operation. Knowl Inf Syst 60(3):1377–1396

    Article  Google Scholar 

  20. Nag A, Singh JP, Singh AK (2020) An efficient Boolean based multi-secret image sharing scheme. Multimed Tools Appl 79(23):16219–16243

    Article  Google Scholar 

  21. Huang B-Y, Juan JS-T (2020) Flexible meaningful visual multi-secret sharing scheme by random grids. Multimed Tools Appl 79(11):7705–7729

    Article  Google Scholar 

  22. Latif A, Mehrnahad Z, Ahmadabadi JZ (2022) A new scheme for lossless meaningful visual secret sharing by using XOR properties. Authorea Preprints

  23. Thien C-C, Lin J-C (2002) Secret image sharing. Comput Graph 26(5):765–770

    Article  Google Scholar 

  24. Ding W et al (2018) Polynomial-based secret image sharing scheme with fully lossless recovery. Int J Digit Crime Forensics (IJDCF) 10(2):120–136

    Article  Google Scholar 

  25. Chang C-C, Huynh N-T, Le H-D (2014) Lossless and unlimited multi-image sharing based on Chinese remainder theorem and Lagrange interpolation. Signal Process 99:159–170

    Article  Google Scholar 

  26. Guo C et al (2016) A multi-threshold secret image sharing scheme based on the generalized Chinese reminder theorem. Multimed Tools Appl 75(18):11577–11594

    Article  Google Scholar 

  27. Deshmukh M, Nain N, Ahmed M (2017) A novel approach for sharing multiple color images by employing Chinese Remainder Theorem. J Vis Commun Image Represent 49:291–302

    Article  Google Scholar 

  28. Prasetyo H, Guo J-M (2019) A note on multiple secret sharing using Chinese remainder theorem and exclusive-OR. IEEE Access 7:37473–37497

    Article  Google Scholar 

  29. Rawat AS, Deshmukh M, Singh M (2023) A novel multi secret image sharing scheme for different dimension secrets. Multimed Tools Appl 1–37

  30. Pande D et al (2023) Single secret sharing scheme using chinese remainder theorem, modified Shamir’s scheme and XOR operation. Wirel Pers Commun 1–29

  31. Gupta M, Gupta M, Deshmukh M (2020) Single secret image sharing scheme using neural cryptography. Multimed Tools Appl 79:12183–12204

    Article  Google Scholar 

  32. Gutub A, Al-Juaid N, Khan E (2019) Counting-based secret sharing technique for multimedia applications. Multimed Tools Appl 78:5591–5619

    Article  Google Scholar 

  33. Kanso A, Ghebleh M (2018) An efficient lossless secret sharing scheme for medical images. J Vis Commun Image Represent 56:245–255

    Article  Google Scholar 

  34. Mhala NC, Pais AR (2019) An improved and secure visual secret sharing (VSS) scheme for medical images. In: 2019 11th International Conference on Communication Systems and Networks (COMSNETS). IEEE

  35. Tiankai S et al (2020) A robust authentication algorithm for medical images based on fractal brownian model and visual cryptography. Sci Program 1–11

  36. Sarosh P et al (2021) Secret sharing-based personal health records management for the internet of health things. Sustain Cities Soc 74:103129

    Article  Google Scholar 

  37. Holla MR, Pais AR (2022) High-performance medical image secret sharing using super-resolution for CAD systems. Appl Intell 1–17

  38. Sardar MK, Pramanik J, Adhikari A (2023) (t, k, n) Regional secret image sharing over finite fields. Signal Process 109082

  39. Gao K et al (2020) A reversible secret image sharing scheme based on stick insect matrix. IEEE Access 8:130405–130416

    Article  Google Scholar 

  40. Liu Y, Chang C-C, Huang P-C (2019) Security protection using two different image shadows with authentication. Math Biosci Eng 16(4):1914–1932

    Article  MathSciNet  MATH  Google Scholar 

  41. Chang C-C et al (2020) A maze matrix-based secret image sharing scheme with cheater detection. Sensors 20(13):3802

    Article  Google Scholar 

  42. Liu Y, Chang C-C (2018) A turtle shell-based visual secret sharing scheme with reversibility and authentication. Multimed Tools Appl 77(19):25295–25310

    Article  Google Scholar 

  43. Rawat AS, Deshmukh M, Singh M (2023) QR shares based secret sharing scheme using DWT, random permutation and arithmetic modulo operation for QR secret. In: 10th International Conference on Signal Processing and Integrated Networks (SPIN). IEEE, pp 772–777

  44. Rawat AS, Deshmukh M, Singh M (2023) Meaningful shares based single secret sharing scheme using Chinese remainder theorem and XOR operation. In: 10th International Conference on Signal Processing and Integrated Networks (SPIN). IEEE, pp 597–602

  45. Ulutas M, Ulutas G, Nabiyev VV (2011) Medical image security and EPR hiding using Shamir’s secret sharing scheme. J Syst Softw 84(3):341–353

    Article  Google Scholar 

  46. Lakshmi VS, Deepthi S, Deepthi PP (2021) Collusion resistant secret sharing scheme for secure data storage and processing over cloud. J Inf Secur Appl 60:102869

    Google Scholar 

  47. Chen M, Liao X, Min W (2022) PulseEdit: editing physiological signals in facial videos for privacy protection. IEEE Trans Inf Forensics Secur 17:457–471

    Article  Google Scholar 

  48. Shivani S (2018) Multi secret sharing with unexpanded meaningful shares. Multimed Tools Appl 77(5):6287–6310

    Article  Google Scholar 

  49. Liu Y, Chang C-C (2018) A turtle shell-based visual secret sharing scheme with reversibility and authentication. Multimed Tools Appl 77(19):25295–25310

    Article  Google Scholar 

  50. Liu Y, Chang C-C, Huang P-C (2019) Security protection using two different image shadows with authentication. Math Biosci Eng 16(4):1914–1932

    Article  MathSciNet  MATH  Google Scholar 

  51. Li X-S et al (2020) A lightweight authenticable visual secret scheme based on turtle shell structure matrix. Multimed Tools Appl 79(1):453–476

    Article  Google Scholar 

  52. Gao K, Horng J-H, Chang C-C (2020) A novel (2, 3) reversible secret image sharing based on fractal matrix. IEEE Access 8:174325–174341

    Article  Google Scholar 

  53. Gao K, Horng J-H, Chang C-C (2021) An authenticatable (2, 3) secret sharing scheme using meaningful share images based on hybrid fractal matrix. IEEE Access 9:50112–50125

    Article  Google Scholar 

  54. Kapadiya VJ, Desai LS, Meghrajani YK (2018) Boolean-based multi secret sharing scheme using meaningful shares. In: 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT). IEEE, pp 840–844

Download references

Funding

This research received no specific grant from any funding agency in the public, commercial, or not-for-profit sectors.

Author information

Authors and Affiliations

Authors

Contributions

Mr. AR done data collection, design of methodology, implementation, and manuscript preparation. Dr. MD (Corresponding author) and Dr. MS provide suggestions for design of the proposed model and done manuscript checking, analysis of the methodology, and results verification.

Corresponding author

Correspondence to Maroti Deshmukh.

Ethics declarations

Conflict of interest

The authors declare that they have no conflicts of the interest.

Ethical approval

The authors declare that there is no violation of ethical rules, this manuscript have not been copyrighted or published previously.

Human and animal rights

There is no involvement of animals in studies. There is no involvement of human participants in studies.

Informed consent

This article contains chest X-ray image, MRI image, and ultrasound image of human are free to use for commercial and non-commercial purposes and no permission is needed, available at: https://unsplash.com/photos/tHS9j3HWT1s, https://en.wikipedia.org/wiki/File:MRI_Head_Brain_Normal.jpg,https://commons.wikimedia.org/wiki/File:CRL_Crown_rump_length_12_weeks_ecografia_Dr._Wolfgang_Moroder.jpg, other non medical images are also free to use for commercial and non-commercial purposes and no permission is needed.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rawat, A.S., Deshmukh, M. & Singh, M. Natural share-based lightweight (nn) single secret image sharing scheme using LSB stuffing for medical images. J Supercomput 79, 19138–19167 (2023). https://doi.org/10.1007/s11227-023-05396-9

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-023-05396-9

Keywords

Navigation