Abstract
To observe the earth surface and its atmospheric interaction, various advanced optical and radar sensors are utilized. This observation returns a huge amount of optical multidimensional remote sensing images which may be used in multidisciplinary fields. The processing of these images in real time is a challenging task because of their high spatial resolution and complex data structure. At the same time, these images are quite confidential in various applications such as in the military and intelligence sectors. For secretly transmitting the remote sensing images in real time, a real-time cheating immune secret sharing approach is introduced in this paper. The proposed approach minimizes the time as well as space complexity for the secret sharing effectively. It also generates meaningful shares without the restriction for any fixed number participants. Generated shares by the proposed approach are cheating immune. That means they can authenticate themselves if tampered with. Experimental results show the effectiveness of the proposed approach.
Similar content being viewed by others
References
Naor, M., Shamir, A.: Visual cryptography. In: Workshop on the theory and application of of cryptographic techniques, pp 1–12. Springer, Berlin (1994)
Zhou, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography. IEEE Trans Image Process 15(8), 2441–2453 (2006)
Fang, W.-P., Lin, J.-C.: Progressive viewing and sharing of sensitive images. Pattern Recogn Image Anal 16(4), 632–636 (2006)
Chen, Shang-Kuan, Lin, Ja-Chen: Fault-tolerant and progressive transmission of images. Pattern Recogn 38(12), 2466–2471 (2005)
Fang, W.-P. et al.: Multi-layer progressive secret image sharing. Proceedings of 7th WSEAS, pp 112–116, (2007)
Thien, Chih-Ching, Lin, Ja-Chen: Secret image sharing. Comput Graph 26(5), 765–770 (2002)
Yan, Xuehu, Yuliang, Lu, Liu, Lintao: A general progressive secret image sharing construction method. Signal Process Image Commun 71, 66–75 (2019)
Chiu, Pei-Ling, Lee, Kai-Hui: Efficient constructions for progressive visual cryptography with meaningful shares. Signal Process 165, 233–249 (2019)
Bhagate, S.B., Kulkarni, P.J.: Cheating prevention in improved extended progressive visual cryptography scheme. In: Computing in Engineering and Technology, pp 585–595, Springer (2020)
Prasetyo, H., Guo, J-M., Hsia, C-H.: Friendly and progressive visual secret sharing with lossless reconstruction. In: 2019 5th International Conference on Science in Information Technology (ICSITech), pp 49–54. IEEE (2019)
Sridhar, S., Sudha, G.F.: Quality improved (k, n) priority based progressive visual secret sharing. Multimed Tools Appl 1–28 (2020)
Jia, Xingxing, Wang, Daoshun, Chu, Qimeng, Chen, Zhenhua: An efficient xor-based verifiable visual cryptographic scheme. Multimed Tools Appl 78(7), 8207–8223 (2019)
Pathak, Y., Arya, K.V., Tiwari, S.: Feature selection for image steganalysis using levy flight-based grey wolf optimization. Multimed Tools Appl 78(2), 1473–1494 (2019)
Zope-Chaudhari, S., Venkatachalam, P., Buddhiraju, KM.: Secure dissemination and protection of multispectral images using crypto-watermarking. IEEE J Sel Topics Appl Earth Observ Rem Sens 8(11), 5388–5394 (2015)
Yanyan, X., Yuxia, Z., Zhengquan, X.: An active-passive security protection method for remote sensing image. In: 2011 International Conference on Network Computing and Information Security, vol. 1, pp 30–34 (2011)
Wang, S.P., Ledley, R.S.: Computer Architecture and security: Fundamentals of Designing Secure Computer Systems. Wiley, USA (2012)
Chang, Ching-Chun, Liu, Yanjun, Chen, Kaimeng: Real-time adaptive visual secret sharing with reversibility and high capacity. J Real-Time Image Process 16(4), 871–881 (2019)
Li, Peng, Yang, Ching-Nung, Kong, Qian: A novel two-in-one image secret sharing scheme based on perfect black visual cryptography. J Real-Time Image Process 14(1), 41–50 (2018)
Papadopoulos, N.A., Psannis, K.E.: Sequential multiple lsb methods and real-time data hiding: variations for visual cryptography ciphers. J Real-Time Image Process 14(1), 75–86 (2018)
Yang, Ching-Nung, Sun, Li-Zhe, Yan, Xuehu, Kim, Cheonshik: Design a new visual cryptography for human-verifiable authentication in accessing a database. J Real-Time Image Process 12(2), 483–494 (2016)
Jiang, L., Zhengquan, X., Yanyan, X.: A new comprehensive security protection for remote sensing image based on the integration of encryption and watermarking. In: 2013 IEEE International Geoscience and Remote Sensing Symposium, vol. 1 (2013)
Author information
Authors and Affiliations
Corresponding authors
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Shivani, S., Patel, S.C., Arora, V. et al. Real-time cheating immune secret sharing for remote sensing images. J Real-Time Image Proc 18, 1493–1508 (2021). https://doi.org/10.1007/s11554-020-01005-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11554-020-01005-7