Skip to main content
Log in

An efficient Boolean based multi-secret image sharing scheme

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The purpose of this paper is to develop an algorithm for sharing k secret images to n participants in such a way that each participant gets a single share image by encoding all k images. Any qualified subgroup of t : tn of those n participants can reconstruct the kith secret image only by combining their share images if they are qualified to reconstruct the kith secret image. Most of the existing literature solves this problem for the cases where t = 2 or t = n making it a very restrictive scheme. In this article, we aim to design a multi-secret image sharing scheme based on XOR operation where t is not restricted to be 2 or n. We have used n random matrices of the same size as the secret image size as private share to generate r (where r is the number of qualified subgroups) share images as public share using XOR operations. The proposed scheme is computationally lightweight and lossless due to XOR operation only. It does not involve any pixel expansion. The experimental results with a very low correlation coefficient between share and secret images confirm that share image does not reveal anything about secret image. The scheme is secure against differential attack as a higher value of Number of Changing Pixel rate (NPCR) confirms that. The current proposal is based on a general access structure, and hence any secret image can be reconstructed by a qualified group of t or more shares where t need not be 2 or n only.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Bakshi S, Sa PK, Wang H, Barpanda SS, Majhi B (2018) Fast periocular authentication in handheld devices with reduced phase intensive local pattern. Multimed Tools Appl 77(14):17595–17623

    Google Scholar 

  2. Bhattacharjee T, Singh JP, Nag A (2012) A novel (2, n) secret image sharing scheme. Procedia Technol 4:619–623

    Google Scholar 

  3. Blakley GR, et al. (1979) Safeguarding cryptographic keys. In: Proceedings of the national computer conference, vol 48, pp 313–317

  4. Blundo C, De Santis A, Stinson DR (1999) On the contrast in visual cryptography schemes. J Cryptol 12(4):261–289

    MathSciNet  MATH  Google Scholar 

  5. Chang C-C, Huynh N-T, Le H-D (2014) Lossless and unlimited multi-image sharing based on Chinese Remainder Theorem and Lagrange interpolation. Signal Process 99:159–170

    Google Scholar 

  6. Chanu OB, Neelima A (2018) A survey paper on secret image sharing schemes. International Journal of Multimedia Information Retrieval, pp 1–21

  7. Chen T-H, Wu C-S (2011) Efficient multi-secret image sharing based on Boolean operations. Signal Process 91(1):90–97

    MATH  Google Scholar 

  8. Chen Y-C, Tsai D-S, Horng G (2013) Visual secret sharing with cheating prevention revisited. Digit Signal Process 23(5):1496–1504

    MathSciNet  Google Scholar 

  9. Chen C-C, Wu W-J (2014) A secure Boolean-based multi-secret image sharing scheme. J Syst Softw 92:107–114

    Google Scholar 

  10. Chen C-C, Wu W-J, Chen J-L (2016) Highly efficient and secure multi-secret image sharing scheme. Multimed Tools Appl 75(12):7113–7128

    Google Scholar 

  11. Chen C-C, Chen J-L (2017) A new Boolean-based multiple secret image sharing scheme to share different sized secret images. J Inf Secur Appl 33:45–54

    Google Scholar 

  12. Chen Q, Zhang G, Yang X, Li S, Li Y, Wang HH (2018) Single image shadow detection and removal based on feature fusion and multiple dictionary learning. Multimed Tools Appl 77(14):18601–18624

    Google Scholar 

  13. Das A, Adhikari A (2010) An efficient multi-use multi-secret sharing scheme based on hash function. Appl Math Lett 23(9):993–996

    MathSciNet  MATH  Google Scholar 

  14. Dehkordi MH, Mashhadi S, Oraei H (2019) A proactive multi stage secret sharing scheme for any given access structure. Wirel Pers Commun 104(1):491–503

    Google Scholar 

  15. Deshmukh M, Nain N, Ahmed M (2018) Efficient and secure multi secret sharing schemes based on Boolean XOR and arithmetic modulo. Multimed Tools Appl 77(1):89–107

    Google Scholar 

  16. Faraoun KM (2017) Design of a new efficient and secure multi-secret images sharing scheme. Multimed Tools Appl 76(5):6247–6261

    Google Scholar 

  17. Ghebleh M, Kanso A (2018) A novel secret image sharing scheme using large primes. Multimed Tools Appl 77(10):11903–11923

    Google Scholar 

  18. Guo C, Zhang H, Song Q, Li M (2016) A multi-threshold secret image sharing scheme based on the generalized Chinese Reminder Theorem. Multimed Tools Appl 75(18):11577–11594

    Google Scholar 

  19. Harn L, Hsu C, Zhang M, He T, Zhang M (2016) Realizing secret sharing with general access structure. Inf Sci 367:209–220

    MATH  Google Scholar 

  20. Harn L, Hsu C-F (2017) (t, n) multi-secret sharing scheme based on bivariate polynomial. Wirel Person Commun 95(2):1495–1504

    Google Scholar 

  21. Ito M, Saito A, Nishizeki T (1989) Secret sharing scheme realizing general access structure. Electron Commun Jpn (Part III: Fund Electron Sci) 72(9):56–64

    MathSciNet  Google Scholar 

  22. Kabirirad S, Eslami Z (2018) A (t, n)-multi secret image sharing scheme based on Boolean operations. J Vis Commun Image Represent 57:39–47

    Google Scholar 

  23. Kanso A, Ghebleh M (2018) An efficient lossless secret sharing scheme for medical images. J Vis Commun Image Represent 56:245–255

    Google Scholar 

  24. Khanzadi H, Eshghi M, Borujeni SE (2014) Image encryption using random bit sequence based on chaotic maps. Arabian J Sci Eng 39(2):1039–1047

    MATH  Google Scholar 

  25. Lin T-L, Horng S-J, Lee K-H, Chiu P-L, Kao T-W, Chen Y-H, Run R-S, Lai J-L, Chen R-J (2010) A novel visual secret sharing scheme for multiple secrets without pixel expansion. Expert Syst Appl 37(12):7858–7869

    Google Scholar 

  26. Lin Y-Y, Wang R-Z (2010) Scalable secret image sharing with smaller shadow images. IEEE Signal Process Lett 17(3):316–319

    MathSciNet  Google Scholar 

  27. Liu H, Wang X et al (2012) Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput 12(5):1457–1466

    Google Scholar 

  28. Liu W, Wang A, Chang C-C, Li Z, Liu L (2015) A grouped-scalable secret image sharing scheme. Multimed Tools Appl 74(17):7095–7109

    Google Scholar 

  29. Liu Y-N, Zhong Q, Xie M, Chen Z-B (2018) A novel multiple-level secret image sharing scheme. Multimed Tools Appl 77(5):6017–6031

    Google Scholar 

  30. Meghrajani YK, Mazumdar HS (2016) Universal share for multi-secret image sharing scheme based on Boolean operation. IEEE Signal Process Lett 23(10):1429–1433

    Google Scholar 

  31. Nag A, Biswas S, Sarkar D, Sarkar PP (2014) Secret image sharing scheme based on a Boolean operation. Cybern Inf Technol 14(2):98–113

    MathSciNet  Google Scholar 

  32. Naor M, Shamir A (1994) Visual cryptography. In: Workshop on the Theory and Application of of Cryptographic Techniques. Springer, pp 1–12

  33. Ou D, Sun W, Wu X (2015) Non-expansible XOR-based visual cryptography scheme with meaningful shares. Signal Process 108:604–621

    Google Scholar 

  34. Ou D, Ye L, Sun W (2015) User-friendly secret image sharing scheme with verification ability based on block truncation coding and error diffusion. J Vis Commun Image Represent 29:46–60

    Google Scholar 

  35. Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613

    MathSciNet  MATH  Google Scholar 

  36. Shivani S (2018a) Multi secret sharing with unexpanded meaningful shares. Multimed Tools Appl 77(5):6287–6310

    Google Scholar 

  37. Shivani S (2018b) VMVC: Verifiable Multi-tone visual cryptography. Multimed Tools Appl 77(5):5169–5188

    Google Scholar 

  38. Singh P, Raman B, Misra M (2018) A (n, n) threshold non-expansible XOR based visual cryptography with unique meaningful shares. Signal Process 142:301–319

    Google Scholar 

  39. Thien C-C, Lin J-C (2002) Secret image sharing. Comput Graph 26(5):765–770

    Google Scholar 

  40. Thien C-C, Lin J-C (2003) An image-sharing method with user-friendly shadow images. IEEE Trans Circ Syst Video Technol 13(12):1161–1169

    Google Scholar 

  41. Wang R-Z, Su C-H (2006) Secret image sharing with smaller shadow images. Pattern Recogn Lett 27(6):551–555

    Google Scholar 

  42. Wang D, Zhang L, Ma N, Li X (2007) Two secret sharing schemes based on Boolean operations. Pattern Recogn 40(10):2776–2785

    MATH  Google Scholar 

  43. Wang K, Zou X, Sui Y (2009) A multiple secret sharing scheme based on matrix projection. In: 2009 33rd Annual IEEE International Computer Software and Applications Conference. IEEE, Vol 1, pp 400–405

  44. Wang X-Y, Zhang Y-Q, Zhao Y-Y (2015) A novel image encryption scheme based on 2-D logistic map and DNA sequence operations. Nonlinear Dyn 82(3):1269–1280

    MathSciNet  Google Scholar 

  45. Wu X, Sun W (2012) Random grid-based visual secret sharing for general access structures with cheat-preventing ability. J Syst Softw 85(5):1119–1134

    Google Scholar 

  46. Wu Y, Noonan PJ, Agaian S (2011) NPCR And UACI randomness tests for image encryption. J Sel Areas Telecommun (JSAT) 1(2):31–38

    Google Scholar 

  47. Wu K-S (2013) A secret image sharing scheme for light images. EURASIP J Adv Signal Process 2013(1):49

    Google Scholar 

  48. Yan X, Lu Y (2018) Progressive visual secret sharing for general access structure with multiple decryptions. Multimed Tools Appl 77(2):2653–2672

    Google Scholar 

  49. Yang C-N, Chen C-H, Cai S-R (2016) Enhanced Boolean-based multi secret image sharing scheme. J Syst Softw 116:22–34

    Google Scholar 

  50. Zarepour-Ahmadabadi J, Shiri-Ahmadabadi M, Latif A (2018) A cellular automata-based multi-stage secret image sharing scheme. Multimed Tools Appl 77(18):24073–24096

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jyoti Prakash Singh.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Nag, A., Singh, J.P. & Singh, A.K. An efficient Boolean based multi-secret image sharing scheme. Multimed Tools Appl 79, 16219–16243 (2020). https://doi.org/10.1007/s11042-019-07807-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-07807-7

Keywords

Navigation