Skip to main content
Log in

Distortion less secret image sharing scheme for Internet of Things system

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Secret image sharing is the study of sharing a secret image with several participants to prevent the malicious participant obtaining information about the secret image. Traditional methods generate meaningless shares, which are unintelligible and easily lead to suspicions of secret image encryption. Rather, sharing methods with steganography were studied. In this paper, a novel secret sharing scheme for image is proposed based on Shamir’s polynomials with steganography the Internet of Things (IoT) system, where IoT devices could share images seamlessly between them over cloud. In this proposed method, secret shares are generated from the cover image and secret information, and the shares of IoT services are embedded back to the cover image based on on \(2^{4}\)-ary notational system, which creates stego-shadow images. Experimental results and analysis show that the proposed scheme can recover both the secret information and cover image lossless. Besides, it achieves high embedding capacity, obtains stego-shadow images of high quality and resists the histogram analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Abawajy, J.H., Hassan, M.M.: Federated Internet of things and cloud computing pervasive patient health monitoring system. IEEE Commun. Mag. 55(1), 48–53 (2017)

    Article  Google Scholar 

  2. Hou, L., Zhao, S., Xiong, X., Zheng, K., Chatzimisios, P., Hossain, M.S., Xiang, W.: Internet of things cloud: architecture and implementation. IEEE Commun. Mag. 54(12), 32–39 (2017)

    Article  Google Scholar 

  3. Hossain, M.S., Muhammad, G.: Cloud-assisted industrial Internet of things (IIoT)-enabled framework for health monitoring. Comput. Netw. 101(2016), 192–202 (2016)

    Article  Google Scholar 

  4. Blakley G.R.: Safeguarding cryptographic keys. In: Proceedings AFIPS 1979 National Computer Conference, vol. 48, pp. 313–317, June (1979)

  5. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  6. Noar, N., Shamir, A.: Visual cryptography. In: Advances in Cryptography—Eurocrypt’94, pp. 1–12 (1995)

  7. Blude, C., Santis, A.D., Naor, M.: Visual cryptography for grey level images. Inf. Process. Lett. 75(6), 255–259 (2000)

    Article  MathSciNet  MATH  Google Scholar 

  8. Lin, C.C., Tsai, W.H.: Visual cryptography for gray-level images by dithering techniques. Pattern Recogn. Lett. 24(1–3), 349–358 (2003)

    Article  MATH  Google Scholar 

  9. Wang, D.S., Yi, F., Li, X.B.: Probabilistic visual secret sharing schemes for grey-scale images and color images. Inf. Sci. 181(11), 2189–2208 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  10. Thien, C.C., Lin, J.C.: Secret image sharing. Comput. Gr. 26(5), 765–770 (2002)

    Article  Google Scholar 

  11. Thien, C.C., Lin, J.C.: An image-sharing method with user-friendly shadow images. IEEE Trans. Circuits Syst. Video Technol. 13(12), 1161–1169 (2003)

    Article  Google Scholar 

  12. Wang, R.Z., Su, C.H.: Secret image sharing with smaller shadow images. Pattern Recogn. Lett. 27(6), 551–555 (2006)

    Article  Google Scholar 

  13. Zhao, R., Zhao, J.J., Dai, F., Zhao, F.Q.: A new image secret sharing scheme to identify cheaters. Comput. Stand. Interfaces 31(1), 252–257 (2009)

    Article  Google Scholar 

  14. Li, L., Abd El-Latif, A.A., Wang, C.J., Li, Q., Niu X.M.: A novel secret image sharing scheme based on chaotic system. In: Proceedings of the SPIE, vol. 8334, id. 833412 (2012)

  15. Li, L., Abd El-Latif, A.A., Shi, Z.F., Niu, X.M.: A new loss-tolerant image encryption scheme based on secret sharing and two chaotic systems. Res. J. Appl. Sci. Eng. Technol. 4(8), 877–883 (2012)

    Google Scholar 

  16. Lin, C.C., Tsai, W.H.: Secret image sharing with steganography and authentication. J. Syst. Softw. 73(3), 405–414 (2004)

    Article  Google Scholar 

  17. Wu, Y.S., Thien, C.C., Lin, J.C.: Sharing and hiding secret images with size constraint. Pattern Recogn. 37(7), 1377–1385 (2004)

    Article  Google Scholar 

  18. Yang, C.N., Chen, T.S., Yu, K.H., Wang, C.C.: Improvements of image sharing with steganography and authentication. J. Syst. Softw. 80(7), 1070–1076 (2007)

    Article  Google Scholar 

  19. Chang, C.C., Hsieh, Y.P., Lin, C.H.: Sharing secrets in stego images with authentication. Pattern Recogn. 41(10), 3130–3137 (2008)

    Article  MATH  Google Scholar 

  20. Lin, P.Y., Lee, J.S., Chang, C.C.: Distortion-free secret images sharing mechanism using modulus operator. Pattern Recogn. 42(5), 886–895 (2009)

    Article  MATH  Google Scholar 

  21. Lin, P.Y., Chan, C.S.: Invertible secret image sharing with steganography. Pattern Recogn. Lett. 31(13), 1887–1893 (2010)

    Article  Google Scholar 

  22. Guo, C., Chang, C.C., Qin, C.: A hierarchical threshold secret image sharing. Pattern Recogn. Lett. 33(1), 83–91 (2012)

    Article  Google Scholar 

  23. Chang, C.C., Lin, P.Y., Wang, Z.H., Li, M.C.: A Sudoku-based secret image sharing scheme with reversibility (invited paper). J. Commun. 5(1), 5–12 (2010)

    Article  Google Scholar 

  24. Guo, C., Wang, Z.H., Chang, C.C., Qin, C.: A secret image sharing scheme with high quality shadows based on exploiting modification direction. J. Multimed. 6(4), 341–348 (2011)

    Article  Google Scholar 

  25. Zhang, X.P., Wang, S.Z.: Efficient steganographic embedding by exploiting modification direction. IEEE Commun. Lett. 10(11), 781–783 (2006)

    Article  Google Scholar 

  26. Osborne, J.: Chapter 42-internet of things and cloud computing. In: Geng, H. (ed.) Part VI: Cloud, Legal, Innovation, and Business Models in Internet of Things and Data Analytics Handbook, 1st edn., pp. 683–698 (2017)

  27. Gilbert, F.: Chapter 43-privacy and security legal issues. In: Geng, H. (ed.) Part VI: Cloud, Legal, Innovation, and Business Models in Internet of Things and Data Analytics Handbook, 1st edn., pp. 699–718 (2017)

  28. Al Alkeem, E., Shehada, D., YeobYeun, C., Jamal Zemerly, M., Hu, J.: New secure healthcare system using cloud of things. Clust. Comput. https://doi.org/10.1007/s10586-017-0872-x (2017)

  29. Jayapandian, N., Rahman, A.M.J.M.Z.: Secure and efficient online data storage and sharing over cloudenvironment using probabilistic with homomorphic encryption. Clust. Comput. 20, 1561–1573 (2017)

    Article  Google Scholar 

  30. Cai, Z., Yan, H., Li, P., Huang, Z., Gao, C.: Towards secure and flexible EHR sharing in mobile health cloud under static assumptions. Cluster computing. https://doi.org/10.1007/s10586-017-0796-5 (2017)

  31. Gopi, R., Rajesh, A.: Securing video cloud storage by ERBAC mechanisms in 5genabled vehicular networks. Clust. Comput. https://doi.org/10.1007/s10586-017-0987-0 (2017)

  32. Lisowiec, A., Nowakowski, A., Ksiazek, L.: Signal processing in switchgear e-diagnosis network. In: Proceedings of the International Symposium on Power Electronics, Electrical Drives, Automation and Motion, pp. 993–996, 20–22 June (2012)

  33. Gnanaraj, J., Ezra, K., Rajsingh, E.: Smart card based time efficientauthentication scheme for global grid computing. J. Human-Centric Comput. Info. Sci. 3(16), 1–17 (2013)

    Google Scholar 

  34. Hu, L., Qiu, M., Song, J., Hossain, M.S., Ghoneim, A.: Software defined healthcare networks. IEEE Wirel. Commun. 22(6), 67–75 (2015)

  35. Coatrieux, G., Huang, H., Shu, H., Luo, L., Roux, C.: Awatermarking-based medical image integrity control system andan image moment signature for tampering characterization. IEEEJ. Biomed. Health Info. 17(6), 1057–1067 (2013)

    Article  Google Scholar 

  36. Islam, M.S., Kim, C.-H., Kim, J.-M.: A GPU-based (8, 4) Hamming decoder for secure transmission ofwatermarked medical images. Clust. Comput. 18, 333–341 (2015). https://doi.org/10.1007/s10586-014-0392-x

    Article  Google Scholar 

  37. Niranjana Devi, K., Muthuselvi, R.: Secret sharing of IoThealthcare data using cryptographic algorithm. Int. J. Eng. Res. 5(5): Special 4, 790–991 (2016)

  38. Arafin, M.T., Qu, G.: Secret sharing and multi-user authentication: from visual cryptography to RRAM circuits. In: Proceedings of the 26th edition on Great Lakes Symposium on VLSI (GLSVLSI ’16). Boston, MA, USA. https://doi.org/10.1145/2902961.2903039, May 18–20 (2016)

  39. Hossain, M.S., Muhammad, G., Rahman, S.M.M., Abdul, W., Alelaiwi, A., Alamri, A.: Towards end-to-end biometrics-based security for IoTinfrastructure. IEEE Wirel. Commun. Mag. 23(5), 45–51 (2016)

    Article  Google Scholar 

  40. Lin, K., Wang, W., Bi, Y., Qiu, M., Hassan, MM.: Human localization based on inertial sensors and fingerprints in the Industrial Internet of Things. Comput. Netw. 101, 113–126

  41. Ogiela, M.R., Ogiela, U.: Grammar encoding in DNA-like secret sharing infrastructure. Advances in Computer Science and Information Technology, pp. 175–182. Springer (2010)

  42. Lin, K., Chen, M., Deng, J., Hassan, M.M., Fortino, G.: Enhanced fingerprinting and trajectory prediction for IoT localization in smart buildings. IEEE Trans. Autom. Sci. Eng. 13(3), 1294–1307 (2016)

  43. Wang, D.: Research of gray-Image steganography based on LSB. Harbin Institute of Technology. Master thesis, December, pp. 16–21 (2008)

  44. Li, L., Abd El-Latif, A.A., Yan, X., Wang, S., Niu, X.: A lossless secret image sharing scheme based on steganography. 2012 Second International Conference on Instrumentation Measurement Computer Communication and Control. 8258(1), 1247–1250 (2012)

  45. Rahman, S.M.M., Hossain, M.A., Hassan, M.M., Alamri, A., Alghamdi, A., Pathan, M.: Secure privacy vault design for distributed multimedia surveillance system. Future Gener. Comput. Syst. 55, 344–352 (2017)

    Article  Google Scholar 

Download references

Acknowledgements

The authors are grateful to the Deanship of Scientific Research at King Saud University for funding this paper through the Vice Deanship of Scientific Research Chairs, and Natural Science Foundation of Guangdong province, China (No. 2015A030310172).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Shamim Hossain.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, L., Hossain, M.S., El-Latif, A.A.A. et al. Distortion less secret image sharing scheme for Internet of Things system. Cluster Comput 22 (Suppl 1), 2293–2307 (2019). https://doi.org/10.1007/s10586-017-1345-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-017-1345-y

Keywords

Navigation