Abstract
Secret image sharing is the study of sharing a secret image with several participants to prevent the malicious participant obtaining information about the secret image. Traditional methods generate meaningless shares, which are unintelligible and easily lead to suspicions of secret image encryption. Rather, sharing methods with steganography were studied. In this paper, a novel secret sharing scheme for image is proposed based on Shamir’s polynomials with steganography the Internet of Things (IoT) system, where IoT devices could share images seamlessly between them over cloud. In this proposed method, secret shares are generated from the cover image and secret information, and the shares of IoT services are embedded back to the cover image based on on \(2^{4}\)-ary notational system, which creates stego-shadow images. Experimental results and analysis show that the proposed scheme can recover both the secret information and cover image lossless. Besides, it achieves high embedding capacity, obtains stego-shadow images of high quality and resists the histogram analysis.
Similar content being viewed by others
References
Abawajy, J.H., Hassan, M.M.: Federated Internet of things and cloud computing pervasive patient health monitoring system. IEEE Commun. Mag. 55(1), 48–53 (2017)
Hou, L., Zhao, S., Xiong, X., Zheng, K., Chatzimisios, P., Hossain, M.S., Xiang, W.: Internet of things cloud: architecture and implementation. IEEE Commun. Mag. 54(12), 32–39 (2017)
Hossain, M.S., Muhammad, G.: Cloud-assisted industrial Internet of things (IIoT)-enabled framework for health monitoring. Comput. Netw. 101(2016), 192–202 (2016)
Blakley G.R.: Safeguarding cryptographic keys. In: Proceedings AFIPS 1979 National Computer Conference, vol. 48, pp. 313–317, June (1979)
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
Noar, N., Shamir, A.: Visual cryptography. In: Advances in Cryptography—Eurocrypt’94, pp. 1–12 (1995)
Blude, C., Santis, A.D., Naor, M.: Visual cryptography for grey level images. Inf. Process. Lett. 75(6), 255–259 (2000)
Lin, C.C., Tsai, W.H.: Visual cryptography for gray-level images by dithering techniques. Pattern Recogn. Lett. 24(1–3), 349–358 (2003)
Wang, D.S., Yi, F., Li, X.B.: Probabilistic visual secret sharing schemes for grey-scale images and color images. Inf. Sci. 181(11), 2189–2208 (2011)
Thien, C.C., Lin, J.C.: Secret image sharing. Comput. Gr. 26(5), 765–770 (2002)
Thien, C.C., Lin, J.C.: An image-sharing method with user-friendly shadow images. IEEE Trans. Circuits Syst. Video Technol. 13(12), 1161–1169 (2003)
Wang, R.Z., Su, C.H.: Secret image sharing with smaller shadow images. Pattern Recogn. Lett. 27(6), 551–555 (2006)
Zhao, R., Zhao, J.J., Dai, F., Zhao, F.Q.: A new image secret sharing scheme to identify cheaters. Comput. Stand. Interfaces 31(1), 252–257 (2009)
Li, L., Abd El-Latif, A.A., Wang, C.J., Li, Q., Niu X.M.: A novel secret image sharing scheme based on chaotic system. In: Proceedings of the SPIE, vol. 8334, id. 833412 (2012)
Li, L., Abd El-Latif, A.A., Shi, Z.F., Niu, X.M.: A new loss-tolerant image encryption scheme based on secret sharing and two chaotic systems. Res. J. Appl. Sci. Eng. Technol. 4(8), 877–883 (2012)
Lin, C.C., Tsai, W.H.: Secret image sharing with steganography and authentication. J. Syst. Softw. 73(3), 405–414 (2004)
Wu, Y.S., Thien, C.C., Lin, J.C.: Sharing and hiding secret images with size constraint. Pattern Recogn. 37(7), 1377–1385 (2004)
Yang, C.N., Chen, T.S., Yu, K.H., Wang, C.C.: Improvements of image sharing with steganography and authentication. J. Syst. Softw. 80(7), 1070–1076 (2007)
Chang, C.C., Hsieh, Y.P., Lin, C.H.: Sharing secrets in stego images with authentication. Pattern Recogn. 41(10), 3130–3137 (2008)
Lin, P.Y., Lee, J.S., Chang, C.C.: Distortion-free secret images sharing mechanism using modulus operator. Pattern Recogn. 42(5), 886–895 (2009)
Lin, P.Y., Chan, C.S.: Invertible secret image sharing with steganography. Pattern Recogn. Lett. 31(13), 1887–1893 (2010)
Guo, C., Chang, C.C., Qin, C.: A hierarchical threshold secret image sharing. Pattern Recogn. Lett. 33(1), 83–91 (2012)
Chang, C.C., Lin, P.Y., Wang, Z.H., Li, M.C.: A Sudoku-based secret image sharing scheme with reversibility (invited paper). J. Commun. 5(1), 5–12 (2010)
Guo, C., Wang, Z.H., Chang, C.C., Qin, C.: A secret image sharing scheme with high quality shadows based on exploiting modification direction. J. Multimed. 6(4), 341–348 (2011)
Zhang, X.P., Wang, S.Z.: Efficient steganographic embedding by exploiting modification direction. IEEE Commun. Lett. 10(11), 781–783 (2006)
Osborne, J.: Chapter 42-internet of things and cloud computing. In: Geng, H. (ed.) Part VI: Cloud, Legal, Innovation, and Business Models in Internet of Things and Data Analytics Handbook, 1st edn., pp. 683–698 (2017)
Gilbert, F.: Chapter 43-privacy and security legal issues. In: Geng, H. (ed.) Part VI: Cloud, Legal, Innovation, and Business Models in Internet of Things and Data Analytics Handbook, 1st edn., pp. 699–718 (2017)
Al Alkeem, E., Shehada, D., YeobYeun, C., Jamal Zemerly, M., Hu, J.: New secure healthcare system using cloud of things. Clust. Comput. https://doi.org/10.1007/s10586-017-0872-x (2017)
Jayapandian, N., Rahman, A.M.J.M.Z.: Secure and efficient online data storage and sharing over cloudenvironment using probabilistic with homomorphic encryption. Clust. Comput. 20, 1561–1573 (2017)
Cai, Z., Yan, H., Li, P., Huang, Z., Gao, C.: Towards secure and flexible EHR sharing in mobile health cloud under static assumptions. Cluster computing. https://doi.org/10.1007/s10586-017-0796-5 (2017)
Gopi, R., Rajesh, A.: Securing video cloud storage by ERBAC mechanisms in 5genabled vehicular networks. Clust. Comput. https://doi.org/10.1007/s10586-017-0987-0 (2017)
Lisowiec, A., Nowakowski, A., Ksiazek, L.: Signal processing in switchgear e-diagnosis network. In: Proceedings of the International Symposium on Power Electronics, Electrical Drives, Automation and Motion, pp. 993–996, 20–22 June (2012)
Gnanaraj, J., Ezra, K., Rajsingh, E.: Smart card based time efficientauthentication scheme for global grid computing. J. Human-Centric Comput. Info. Sci. 3(16), 1–17 (2013)
Hu, L., Qiu, M., Song, J., Hossain, M.S., Ghoneim, A.: Software defined healthcare networks. IEEE Wirel. Commun. 22(6), 67–75 (2015)
Coatrieux, G., Huang, H., Shu, H., Luo, L., Roux, C.: Awatermarking-based medical image integrity control system andan image moment signature for tampering characterization. IEEEJ. Biomed. Health Info. 17(6), 1057–1067 (2013)
Islam, M.S., Kim, C.-H., Kim, J.-M.: A GPU-based (8, 4) Hamming decoder for secure transmission ofwatermarked medical images. Clust. Comput. 18, 333–341 (2015). https://doi.org/10.1007/s10586-014-0392-x
Niranjana Devi, K., Muthuselvi, R.: Secret sharing of IoThealthcare data using cryptographic algorithm. Int. J. Eng. Res. 5(5): Special 4, 790–991 (2016)
Arafin, M.T., Qu, G.: Secret sharing and multi-user authentication: from visual cryptography to RRAM circuits. In: Proceedings of the 26th edition on Great Lakes Symposium on VLSI (GLSVLSI ’16). Boston, MA, USA. https://doi.org/10.1145/2902961.2903039, May 18–20 (2016)
Hossain, M.S., Muhammad, G., Rahman, S.M.M., Abdul, W., Alelaiwi, A., Alamri, A.: Towards end-to-end biometrics-based security for IoTinfrastructure. IEEE Wirel. Commun. Mag. 23(5), 45–51 (2016)
Lin, K., Wang, W., Bi, Y., Qiu, M., Hassan, MM.: Human localization based on inertial sensors and fingerprints in the Industrial Internet of Things. Comput. Netw. 101, 113–126
Ogiela, M.R., Ogiela, U.: Grammar encoding in DNA-like secret sharing infrastructure. Advances in Computer Science and Information Technology, pp. 175–182. Springer (2010)
Lin, K., Chen, M., Deng, J., Hassan, M.M., Fortino, G.: Enhanced fingerprinting and trajectory prediction for IoT localization in smart buildings. IEEE Trans. Autom. Sci. Eng. 13(3), 1294–1307 (2016)
Wang, D.: Research of gray-Image steganography based on LSB. Harbin Institute of Technology. Master thesis, December, pp. 16–21 (2008)
Li, L., Abd El-Latif, A.A., Yan, X., Wang, S., Niu, X.: A lossless secret image sharing scheme based on steganography. 2012 Second International Conference on Instrumentation Measurement Computer Communication and Control. 8258(1), 1247–1250 (2012)
Rahman, S.M.M., Hossain, M.A., Hassan, M.M., Alamri, A., Alghamdi, A., Pathan, M.: Secure privacy vault design for distributed multimedia surveillance system. Future Gener. Comput. Syst. 55, 344–352 (2017)
Acknowledgements
The authors are grateful to the Deanship of Scientific Research at King Saud University for funding this paper through the Vice Deanship of Scientific Research Chairs, and Natural Science Foundation of Guangdong province, China (No. 2015A030310172).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Li, L., Hossain, M.S., El-Latif, A.A.A. et al. Distortion less secret image sharing scheme for Internet of Things system. Cluster Comput 22 (Suppl 1), 2293–2307 (2019). https://doi.org/10.1007/s10586-017-1345-y
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-017-1345-y