Abstract
Secret Image Sharing (SIS) scheme is to encrypt a secret image into ‘n’ specious shadows. It is unable to reveal any data on the secret image if at least one of the shadows is not achieved. In this paper, wavelet-based secret image sharing scheme is proposed with encrypted shadow images using optimal Homomorphic Encryption (HE) technique. Initially, Discrete Wavelet Transform (DWT) is applied on the secret image to produce sub bands. From this process, multiple shadows are created, encrypted and decrypted for each shadow. The encrypted shadow can be recovered just by choosing some subset of these ‘n’ shadows that makes transparent and stack over each other. To improve the shadow security, each shadow is encrypted and decrypted using HE technique. For the concern on image quality, the new Oppositional based Harmony Search (OHS) algorithm was utilized to generate the optimal key. From the analysis, it shows that the proposed scheme provide greater security compared to other existing schemes.








Similar content being viewed by others
Explore related subjects
Discover the latest articles and news from researchers in related subjects, suggested using machine learning.Change history
13 June 2023
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1007/s12652-023-04654-1
References
Baghel SS, Goyal A (2016) Improved the security strength of visual cryptography using feature-based watermarking technique. Int J Comput Appl 153(11):9–13
Banik BG, Bandyopadhyay SK (2015) Secret sharing using 3 level DWT method of image steganography based on Lorenz chaotic encryption and visual cryptography. In: Computational Intelligence and Communication Networks (CICN), 2015 International Conference on IEEE, pp 1147–1152
Challa R, Vijayakumar G, Sunny B (2015). Secure image processing using LWE based homomorphic encryption. In: Electrical, Computer and Communication Technologies (ICECCT), 2015 IEEE International Conference on IEEE, pp 1–6
Dardzinska-Glebocka A (2007) Optimization algorithm and data security problem in distributed information systems. In: Signal-image technologies and internet-based system, 2007. SITIS’07. Third International IEEE Conference on IEEE, pp 116–120
Dasgupta S, Pal SK (2016) Design of a polynomial ring based symmetric homomorphic encryption scheme. Perspect Sci 8:692–695
Dayanand IE, Kumar RS (2014) Analysis of secret image sharing using shared image. Int J Comput Appl 108(7):35–39
Dharwadkar NV, Amberker BB (2010) Watermarking scheme for color images using wavelet transform based texture properties and secret sharing. Int J Signal Process 6(2):93–100
Elhoseny M, Yuan X, ElMinir HK, Riad AM (2016a) An energy efficient encryption method for secure dynamic WSN. Secur Commun Netw 9(13):2024–2031
Elhoseny M, Elminir H, Riad A, Yuan X (2016b) A secure data routing schema for WSN using elliptic curve cryptography and homomorphic encryption. J King Saud Univ Comput Inf Sci 28(3):262–275. https://doi.org/10.1016/j.jksuci.2015.11.001
Elhoseny M, Hosny A, Hassanien AE, Muhammad K, AK Sangaiah (2017) Secure automated forensic investigation for sustainable critical infrastructures compliant with green computing requirements. IEEE Trans Sustain Comput:. https://doi.org/10.1109/TSUSC.2017.2782737
Gupta D, Choubey S (2015) The discrete wavelet transforms for image processing. Int J Emerg Technol Adv Eng 4(3):598–602
Houssein EH, Ali MA, Hassanien AE (2016) An image steganography algorithm using haar discrete wavelet transform with advanced encryption system. In: Computer Science and Information Systems (FedCSIS), 2016 Federated Conference on IEEE, pp 641–644
Jiang Q, Chen Z, Li B, Shen J, Yang L, Ma J (2018) Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems. J Ambient Intell Humaniz Comput 9(4):1061–1073. https://doi.org/10.1007/s12652-017-0516-2
Karolin M, Meyyapan DT (2015) RGB based secret sharing scheme in color visual cryptography. Int J Adv Res Comput Commun Eng 4(7):151–155
Kumar C, Singh AK, Kumar P (2018a) Improved wavelet-based image watermarking through SPIHT. Multimed Tools Appl:. https://doi.org/10.1007/s11042-018-6177-0
Kumar C, Singh AK, Kumar P, Singh R, Singh S 2018b SPIHT-based multiple image watermarking in NSCT domain. Concurr Comput Pract Exp. https://doi.org/10.1002/cpe.4912
Kumari S, Karuppiah M, Das AK, Li X, Wu F, Gupta V (2018) Design of a secure anonymity-preserving authentication scheme for session initiation protocol using elliptic curve cryptography. J Ambient Intell Humaniz Comput 9(3):643–653. https://doi.org/10.1007/s12652-017-0460-1
Kuppusamy K, Thamodaran K (2013) Optimized hybrid security mechanism for image authentication and secrecy using PSO. Int J Netw Secur Appl 5(5):115–128
Linju PS, Mathews S (2016) An efficient interception mechanism against cheating in visual cryptography with non pixel expansion of images. Int J Sci Technol Res 5(01):102–106
Liu J, Ke L (2018) New efficient identity based encryption without pairings. J Ambient Intell Humaniz Comput.. https://doi.org/10.1007/s12652-018-0756-9
Mishra DC, Sharma RK (2014) Application of algebra and discrete wavelet transform in two-dimensional data (RGB-images) security. Int J Wavelets Multiresolut Inf Process 12(06):1450040–1450041
Nagdive MPS, Raut AB (2015) Image visual cryptography by using haar wavelet-based decomposition. Int J Adv Res Comput Eng Technol 4(4):1261–1265
Nazimul Islam Gupta D, Choubey S (2015) Security improvement of image by visual cryptography using super imposed wavelet transform in image processing. Int J Adv Res Comput Sci Softw Eng 5(5):498–503
NouraMetawaa M, KabirHassana, Elhoseny M (2017) Genetic algorithm based model for optimizing bank lending decisions. Expert Syst Appl 80:75–82
Pang CJ (2009) An image encryption algorithm based on discrete wavelet transform and two dimension cat mapping. In: Networks security, wireless communications and trusted computing, 2009. NSWCTC’09. International Conference on (Vol 2, pp 711–714). IEEE
Rani MMS, Mary GG (2016) Enhancement of RGB shares of visual cryptography using PSO. Int J Comput Sci Inf Secur 14(9):938
Reddy GT, Meenakshi N (2014) Extended and embedded visual cryptography. Int J Comput Sci Mob Comput 3(2):235–247
Revathy S (2014) Secure crypto system for image encryption and data embedding using chaos and BB equation algorithm. Int J Comput Sci Mob Comput 3(3):297–306
Sanyasi Naidu P, Kharat R, Tekade R, Mendhe P, Magade V (2016) E-voting system using visual cryptography & secure multi-party computation. In: 2016 International Conference on IEEE Computing Communication Control and automation (ICCUBEA). IEEE, Pune, pp 1–4
Shaheen AM, Sheltami TR, Al-Kharoubi TM, Shakshuki E (2018) Digital image encryption techniques for wireless sensor networks using image transformation methods. DCT and DWT. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-018-0850-z
Shankar K, Eswaran P (2015a) ECC based image encryption scheme with aid of optimization technique using differential evolution algorithm. Int J ApplEng Res 10(55):1841–1845
Shankar K, Eswaran P (2015b) Sharing a secret image with encapsulated shares in visual cryptography. Procedia Comput Sci 70:462–468
Shankar K, Eswaran P (2015c) A secure visual secret share (VSS) creation scheme in visual cryptography using elliptic curve cryptography with optimization technique. Aust J Basic Appl Sci 9(36):150–163
Shankar K, Eswaran P (2016a) RGB-based secure share creation in visual cryptography using optimal elliptic curve cryptography technique. J Circuits Syst Comput 25(11):1650138
Shankar K, Eswaran P (2016b) A new k out of n secret image sharing scheme in visual cryptography. In: 2016 10th International conference on intelligent systems and control (ISCO). IEEE, pp 1–6
Shankar K, Eswaran P (2016c) An efficient image encryption technique based on optimized key generation in ECC using genetic algorithm. In: Artificial intelligence and evolutionary computations in engineering systems. Springer, New Delhi, pp 705–714
Shankar K, Eswaran P (2017) RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography. China Commun 14(2):118–130
Shankar K, Lakshmanaprabu SK (2018) Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm. Int J Eng Technol 7(1.9):22–27
Singh AK, Kumar B, Singh SK, Ghrera SP, Mohan A (2016) Multiple watermarking technique for securing online social network contents using back propagation neural network. Future Gener Comput Syst 86:926–939. https://doi.org/10.1016/j.future.2016.11.023
Singh L, Singh AK, Singh PK (2018) Secure data hiding techniques: a survey. Multimed Tools Appl,. https://doi.org/10.1007/s11042-018-6407-5
Sokouti M, Zakerolhosseini A, Sokouti B (2016) Medical image encryption: an application for improved padding based GGH encryption algorithm. Open Med Inform J 10:11–22
Srivastava R, Kumar B, Singh AK, Mohan A (2018) Computationally efficient joint imperceptible image watermarking and JPEG compression: a green computing approach. Multimed Tools Appl 77(13):16447–16459. https://doi.org/10.1007/s11042-017-5214-8
Talarposhti KM, andJamei MK (2016) A secure image encryption method based on dynamic harmony search (DHS) combined with the chaotic map. Opt Lasers Eng 81:21–34
Thakur S, Singh AK, Ghrera SP, Mohamed Elhoseny (2018a) Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimed Tools Appl:. https://doi.org/10.1007/s11042-018-6263-3
Thakur S, Singh AK, Ghrera SP, Mohan A (2018b) Chaotic based secure watermarking approach for medical images. Multimed Tools Appl:. https://doi.org/10.1007/s11042-018-6691-0
Toughi S, Fathi MH, Sekhavat YA (2017) An image encryption scheme based on elliptic curve pseudo-random and advanced encryption system. Signal Process 141:217–227
Vengadapurvaja AM, Nisha G, Aarthy R, Sasikaladevi N (2017) An efficient homomorphic medical image encryption algorithm for cloud storage security. Procedia Comput Sci 115:643–650
Younes MAB (2016) Literature survey on different techniques of image encryption. J Sci Eng Res 7(1):93–98
Zhang Q, Xu D (2018) Security authentication technology based on dynamic Bayesian network in Internet of Things. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-018-0949-2
Zhang J, Wang B, Xhafa F, Wang XA, Li C (2017) Energy-efficient secure outsourcing decryption of attribute based encryption for mobile device in cloud computation. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-017-0658-2
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article has been retracted. Please see the retraction notice for more detail: https://doi.org/10.1007/s12652-023-04654-1
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Shankar, K., Elhoseny, M., Kumar, R.S. et al. RETRACTED ARTICLE: Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. J Ambient Intell Human Comput 11, 1821–1833 (2020). https://doi.org/10.1007/s12652-018-1161-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-018-1161-0