Skip to main content
Log in

Real-time cheating immune secret sharing for remote sensing images

  • Special Issue Paper
  • Published:
Journal of Real-Time Image Processing Aims and scope Submit manuscript

Abstract

To observe the earth surface and its atmospheric interaction, various advanced optical and radar sensors are utilized. This observation returns a huge amount of optical multidimensional remote sensing images which may be used in multidisciplinary fields. The processing of these images in real time is a challenging task because of their high spatial resolution and complex data structure. At the same time, these images are quite confidential in various applications such as in the military and intelligence sectors. For secretly transmitting the remote sensing images in real time, a real-time cheating immune secret sharing approach is introduced in this paper. The proposed approach minimizes the time as well as space complexity for the secret sharing effectively. It also generates meaningful shares without the restriction for any fixed number participants. Generated shares by the proposed approach are cheating immune. That means they can authenticate themselves if tampered with. Experimental results show the effectiveness of the proposed approach.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Naor, M., Shamir, A.: Visual cryptography. In: Workshop on the theory and application of of cryptographic techniques, pp 1–12. Springer, Berlin (1994)

  2. Zhou, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography. IEEE Trans Image Process 15(8), 2441–2453 (2006)

    Article  Google Scholar 

  3. Fang, W.-P., Lin, J.-C.: Progressive viewing and sharing of sensitive images. Pattern Recogn Image Anal 16(4), 632–636 (2006)

    Article  MathSciNet  Google Scholar 

  4. Chen, Shang-Kuan, Lin, Ja-Chen: Fault-tolerant and progressive transmission of images. Pattern Recogn 38(12), 2466–2471 (2005)

    Article  Google Scholar 

  5. Fang, W.-P. et al.: Multi-layer progressive secret image sharing. Proceedings of 7th WSEAS, pp 112–116, (2007)

  6. Thien, Chih-Ching, Lin, Ja-Chen: Secret image sharing. Comput Graph 26(5), 765–770 (2002)

    Article  Google Scholar 

  7. Yan, Xuehu, Yuliang, Lu, Liu, Lintao: A general progressive secret image sharing construction method. Signal Process Image Commun 71, 66–75 (2019)

    Article  Google Scholar 

  8. Chiu, Pei-Ling, Lee, Kai-Hui: Efficient constructions for progressive visual cryptography with meaningful shares. Signal Process 165, 233–249 (2019)

    Article  Google Scholar 

  9. Bhagate, S.B., Kulkarni, P.J.: Cheating prevention in improved extended progressive visual cryptography scheme. In: Computing in Engineering and Technology, pp 585–595, Springer (2020)

  10. Prasetyo, H., Guo, J-M., Hsia, C-H.: Friendly and progressive visual secret sharing with lossless reconstruction. In: 2019 5th International Conference on Science in Information Technology (ICSITech), pp 49–54. IEEE (2019)

  11. Sridhar, S., Sudha, G.F.: Quality improved (k, n) priority based progressive visual secret sharing. Multimed Tools Appl 1–28 (2020)

  12. Jia, Xingxing, Wang, Daoshun, Chu, Qimeng, Chen, Zhenhua: An efficient xor-based verifiable visual cryptographic scheme. Multimed Tools Appl 78(7), 8207–8223 (2019)

    Article  Google Scholar 

  13. Pathak, Y., Arya, K.V., Tiwari, S.: Feature selection for image steganalysis using levy flight-based grey wolf optimization. Multimed Tools Appl 78(2), 1473–1494 (2019)

    Article  Google Scholar 

  14. Zope-Chaudhari, S., Venkatachalam, P., Buddhiraju, KM.: Secure dissemination and protection of multispectral images using crypto-watermarking. IEEE J Sel Topics Appl Earth Observ Rem Sens 8(11), 5388–5394 (2015)

  15. Yanyan, X., Yuxia, Z., Zhengquan, X.: An active-passive security protection method for remote sensing image. In: 2011 International Conference on Network Computing and Information Security, vol. 1, pp 30–34 (2011)

  16. Wang, S.P., Ledley, R.S.: Computer Architecture and security: Fundamentals of Designing Secure Computer Systems. Wiley, USA (2012)

    Book  Google Scholar 

  17. Chang, Ching-Chun, Liu, Yanjun, Chen, Kaimeng: Real-time adaptive visual secret sharing with reversibility and high capacity. J Real-Time Image Process 16(4), 871–881 (2019)

    Article  Google Scholar 

  18. Li, Peng, Yang, Ching-Nung, Kong, Qian: A novel two-in-one image secret sharing scheme based on perfect black visual cryptography. J Real-Time Image Process 14(1), 41–50 (2018)

    Article  Google Scholar 

  19. Papadopoulos, N.A., Psannis, K.E.: Sequential multiple lsb methods and real-time data hiding: variations for visual cryptography ciphers. J Real-Time Image Process 14(1), 75–86 (2018)

    Article  Google Scholar 

  20. Yang, Ching-Nung, Sun, Li-Zhe, Yan, Xuehu, Kim, Cheonshik: Design a new visual cryptography for human-verifiable authentication in accessing a database. J Real-Time Image Process 12(2), 483–494 (2016)

    Article  Google Scholar 

  21. Jiang, L., Zhengquan, X., Yanyan, X.: A new comprehensive security protection for remote sensing image based on the integration of encryption and watermarking. In: 2013 IEEE International Geoscience and Remote Sensing Symposium, vol. 1 (2013)

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Bhisham Sharma, Alireza Jolfaei or Gautam Srivastava.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shivani, S., Patel, S.C., Arora, V. et al. Real-time cheating immune secret sharing for remote sensing images. J Real-Time Image Proc 18, 1493–1508 (2021). https://doi.org/10.1007/s11554-020-01005-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11554-020-01005-7

Keywords

Navigation