Skip to main content

Advertisement

Log in

Double layer secure secret images sharing scheme for biometrics

  • Published:
Distributed and Parallel Databases Aims and scope Submit manuscript

Abstract

Biometric strategy is primarily followed for authentication which incorporates the distinct recognition of the individual depending on their physical or behavioral features. Among all the biometrics techniques, ‘Iris scanning’ is touted to be the most secure technique due to its uniqueness and constancy. However, it is challenging to safely store the iris template in database since it can be stolen or corrupted easily. Secret sharing is a significant method that can be utilized to secure the secrecy of these biometric images transmitted over open channels. Additionally, the access control can be enhanced through authentication by a human being who receives the images, in the absence of any trusted communication channels which in turn reduces the risk of data leakage. Therefore, this study developed an efficient Double Layered Secure Secret Images Sharing Scheme for Biometrics. The proposed Double Layered Secure Secret Images Sharing Scheme is the first of its kind technique in this era, which enables double protection for sensitive data by incorporating two layers of secret sharing. In first layer, threshold-based secret sharing is performed and the second layer of secret sharing is performed with Shamir’s secret sharing approach. Moreover, to enhance access control feature by unauthorized parties, the shared images are then encrypted using stream cipher, where Opposition based Ant Lion Optimization algorithm is used for key generation. The maximum PSNR was 49.1347 while it was 47.4671 for existing method thus better results were achieved by the proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Hashim, A.T., Noori, D.A.: Biometric privacy using secret image sharing. Eng. Technol. J. 35(7), 701–708 (2017)

    Article  Google Scholar 

  2. Karakus, S., Avci, E.: A new image steganography method with optimum pixel similarity for data hiding in medical images. Med. Hypotheses 139, 109691–109691 (2020)

    Article  Google Scholar 

  3. Kanso, A., Ghebleh, M.: An efficient lossless secret sharing scheme for medical images. J. Vis. Commun. Image Represent. 56, 245–255 (2018)

    Article  Google Scholar 

  4. Nipanikar, S.I., Hima Deepthi, V., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alex. Eng. J. 57(4), 2343–2356 (2018)

    Article  Google Scholar 

  5. Chang, C.-C., Liu, Y., Wu, H.-L.: Distortion-free secret image sharing method with two meaningful shadows. IET Image Proc. 10(8), 590–597 (2016)

    Article  Google Scholar 

  6. Liu, W., Yinsong, Xu., Zhang, M., Chen, J., Yang, C.-N.: A novel quantum visual secret sharing scheme. IEEE Access 7, 114374–114384 (2019)

    Article  Google Scholar 

  7. Hodeish, M.E., Bukauskas, L., Humbe, V.T.: An optimal (k, n) visual secret sharing scheme for information security. Procedia Comput. Sci. 93, 760–767 (2016)

    Article  Google Scholar 

  8. Li, X., Liu, Y., Chen, H., Chang, C.-C.: A secret image restoring scheme using threshold pairs of unordered image shares. IEEE Access 7, 118249–118258 (2019)

    Article  Google Scholar 

  9. Thien, C.C., Lin, J.C.: Secret image sharing. Comput Graph. 26(5), 765–770 (2002)

    Article  Google Scholar 

  10. Hu, Y.-X., Liu, Y.-N.: A progressively essential secret image sharing scheme using hierarchy shadow. J. Inf. Secur. Appl. 47, 371–376 (2019)

    Google Scholar 

  11. Yan, X., Gong, Q., Li, L., Yang, G., Lu, Y., Liu, J.: Secret image sharing with separate shadow authentication ability. Signal Process. Image Commun. 82, 115721 (2020)

    Article  Google Scholar 

  12. Ahmadian, A.M., Amirmazlaghani, M.: A novel secret image sharing with steganography scheme utilizing Optimal Asymmetric Encryption Padding and Information Dispersal Algorithms. Signal Process. Image Commun. 74, 78–88 (2019)

    Article  Google Scholar 

  13. Elavarasi, G., Vanitha, M.: Securing biometric data with multiple share creation and light weight visual cryptography technique. Int. J. Sci. Technol. Res. 8(12), 3248 (2019)

    Google Scholar 

  14. Chen, Y.-C., Hung, T.-H., Hsieh, S.-H., Shiu, C.-W.: A new reversible data hiding in encrypted image based on multi-secret sharing and lightweight cryptographic algorithms. IEEE Trans. Inf. Forensics Secur. 14(12), 3332–3343 (2019)

    Article  Google Scholar 

  15. Guo, J.-M., Riyono, D., Prasetyo, H.: Improved beta chaotic image encryption for multiple secret sharing. IEEE Access 6, 46297–46321 (2018)

    Article  Google Scholar 

  16. Meghrajani, Y.K., Desai, L.S., Mazumdar, H.S.: Secure and efficient arithmetic-based multi-secret image sharing scheme using universal share. J. Inf. Secur. Appl. 47, 267–274 (2019)

    Google Scholar 

  17. Wu, X., Weng, J., Yan, W.Q.: Adopting secret sharing for reversible data hiding in encrypted images. Signal Process. 143, 269–281 (2018)

    Article  Google Scholar 

  18. Sasaki, M., Watanabe, Y.: Visual secret sharing schemes encrypting multiple images. IEEE Trans. Inf. Forensics Secur. 13(2), 356–365 (2017)

    Article  Google Scholar 

  19. Shankar, K., Eswaran, P.: RGB based secure share creation in visual cryptography using optimal elliptic curve cryptography technique. J. Circuits Syst. Comput. 25(11), 1650138 (2016)

    Article  Google Scholar 

  20. Shankar, K., Eswaran, P.: RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography. China Commun. 14(2), 118–130 (2017)

    Article  Google Scholar 

Download references

Acknowledgements

This research work has been supported by RUSA PHASE 2.0, Alagappa University, Karaikudi.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Elavarasi Gunasekaran.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gunasekaran, E., Muthuraman, V. Double layer secure secret images sharing scheme for biometrics. Distrib Parallel Databases 40, 861–885 (2022). https://doi.org/10.1007/s10619-021-07362-x

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10619-021-07362-x

Keywords

Navigation