Skip to main content
Log in

A verifiable multi-secret image sharing scheme using XOR operation and hash function

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In a secret image sharing (SIS) scheme, a dealer (the data owner or a trusted third-party) encodes a secret image into some share images and distributes them among some participants such that each participant receives exactly one share. Most of the secret image sharing schemes assume a trusted dealer and participants. They do not use any verification of the share images while they are presented for secret reconstruction. In this article, we propose a verifiable multi-secret image sharing scheme using Boolean operations and a secure hash function. We consider n secret images for sharing and convert each secret image to a complete noisy image by using a secure hash function, XOR operations, and a specially designed pseudo-random image-matrix generator function. Then, we use XOR operations to generate the share images. The hash function calls are chained in a unique way to enable reconstruction and verification at a low cost for the secret images. The use of hash function also ensures that secrecy of share images and secret images remains consistent. The experimental results and security analysis prove that the scheme is secure and verifiable.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

References

  1. Chattopadhyay AK, Ghosh D, Maitra P, Nag A, Saha HN (2018) A verifiable (n, n) secret image sharing scheme using XOR operations. In: Proceedings of 9th IEEE Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), pages 1025–1031. IEEE

  2. Chattopadhyay AK, Maitra P, Saha HN, Nag A (2018) A verifiable multi-secret sharing scheme with elliptic curve cryptography. In: Proceedings of the 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), pages 1374–1379. IEEE

  3. Chen C-C, Wu W-J (2014) A secure Boolean-based multi-secret image sharing scheme. J Syst Softw 92:107–114

    Google Scholar 

  4. Chen C-C, Wu W-J, Chen J-L (2016) Highly efficient and secure multi-secret image sharing scheme. Multimedia Tools and Applications 75(12):7113–7128

    MathSciNet  Google Scholar 

  5. Chen D, Lu W, Xing W, Wang N (2019) An efficient verifiable threshold multi-secret sharing scheme with different stages. IEEE Access 7:107104–107110

    Google Scholar 

  6. Chen T-H, Wu C-S (2011) Efficient multi-secret image sharing based on Boolean operations. Signal Process 91(1):90–97

    MATH  Google Scholar 

  7. Chen Y-C, Tsai D-S, Horng G (2013) Visual secret sharing with cheating prevention revisited. Digital Signal Processing 23(5):1496–1504

    MathSciNet  Google Scholar 

  8. Chen Y-R, Chen L-H (2017) Region image sharing with various secrecy levels. Multimedia Tools and Applications 76(2):1721–1734

    MathSciNet  Google Scholar 

  9. Chor B, Goldwasser S, Micali S, Awerbuch B (1985) Verifiable secret sharing and achieving simultaneity in the presence of faults. In: Proceedings of 26th Annual Symposium on Foundations of Computer Science (SFCS 1985), pages 383–395. IEEE

  10. Das A, Adhikari A (2010) An efficient multi-use multi-secret sharing scheme based on hash function. Applied Mathematics Letters 23(9):993–996

    MathSciNet  MATH  Google Scholar 

  11. Dehkordi MH, Mashhadi S (2008) An efficient threshold verifiable multi-secret sharing. Computer Standards & Interfaces 30(3):187–190

    MATH  Google Scholar 

  12. Dehkordi MH, Mashhadi S (2008) New efficient and practical verifiable multi-secret sharing schemes. Information Sciences 178(9):2262–2274

    MathSciNet  MATH  Google Scholar 

  13. Dehkordi MH, Mashhadi S (2008) Verifiable secret sharing schemes based on non-homogeneous linear recursions and elliptic curves. Computer Communications 31(9):1777–1784

    Google Scholar 

  14. Dehkordi MH, Oraei H (2019) How to construct a verifiable multi-secret sharing scheme based on graded encoding schemes. IET Inf Secur 13(4):343–351

    Google Scholar 

  15. dela Cruz R, Wang H (2013) Cheating-immune secret sharing schemes from codes and cumulative arrays. Cryptography and Communications 5(1):67–83

    MathSciNet  MATH  Google Scholar 

  16. Deshmukh M, Nain N, Ahmed M (2017) A novel approach for sharing multiple color images by employing Chinese remainder theorem. Journal of Visual Communication and Image Representation 49:291–302

    Google Scholar 

  17. Deshmukh M, Nain N, Ahmed M (2018) Efficient and secure multi secret sharing schemes based on Boolean XOR and arithmetic modulo. Multimedia Tools and Applications 77(1):89–107

    Google Scholar 

  18. Faraoun KM (2017) Design of a new efficient and secure multi-secret images sharing scheme. Multimedia Tools and Applications 76(5):6247–6261

    Google Scholar 

  19. Guo C, Zhang H, Fu Z, Feng B, Li M (2018) A novel proactive secret image sharing scheme based on LISS. Multimedia Tools and Applications 77(15):19569–19590

    Google Scholar 

  20. Harn L, Fuyou M, Chang C-C (2013) Verifiable secret sharing based on the Chinese remainder theorem. Security and Communication Networks 7 (6):950–957

    Google Scholar 

  21. Harn L, Lin C (2009) Detection and identification of cheaters in (t, n) secret sharing scheme. Des Codes Crypt 52(1):15–24

    MathSciNet  MATH  Google Scholar 

  22. Hu C, Liao X, Cheng X (2012) Verifiable multi-secret sharing based on LFSR sequences. Theoretical Computer Science 445:52–62

    MathSciNet  MATH  Google Scholar 

  23. Kabirirad S, Eslami Z (2018) A (t, n)-multi secret image sharing scheme based on Boolean operations. Journal of Visual Communication and Image Representation 57:39–47

    Google Scholar 

  24. Kabirirad S, Eslami Z (2019) Improvement of (n, n)-multi-secret image sharing schemes based on Boolean operations. Journal of Information Security and Applications 47:16–27

    Google Scholar 

  25. Kandar S, Dhara BC (2020) A verifiable secret sharing scheme with combiner verification and cheater identification. Journal of Information Security and Applications 51:102430

    Google Scholar 

  26. Kanso A, Ghebleh M (2018) An efficient lossless secret sharing scheme for medical images. J Vis Commun Image Represent 56:245–255

    Google Scholar 

  27. Lin P-Y, Wang R-Z, Chang Y-J, Fang W-P (2015) Prevention of cheating in visual cryptography by using coherent patterns. Inf Sci 301:61–74

    MathSciNet  MATH  Google Scholar 

  28. Lin T-L, Horng S-J, Lee K-H, Chiu P-L, Kao T-W, Chen Y-H, Run R-S, Lai J-L, Chen R-J (2010) A novel visual secret sharing scheme for multiple secrets without pixel expansion. Expert Syst Appl 37(12):7858–7869

    Google Scholar 

  29. Liu Y, Harn L, Chang C-C (2015) A novel verifiable secret sharing mechanism using theory of numbers and a method for sharing secrets. International Journal of Communication Systems 28(7):1282–1292

    Google Scholar 

  30. Liu Y, Yang C, Wang Y, Zhu L, Ji W (2018) Cheating identifiable secret sharing scheme using symmetric bivariate polynomial. Inf Sci 453:21–29

    MathSciNet  MATH  Google Scholar 

  31. Liu Y-X, Sun Q-D, Yang C-N (2018) (k,n) secret image sharing scheme capable of cheating detection. EURASIP Journal on Wireless Communications and Networking 72:1–6

    Google Scholar 

  32. Mashhadi S, Dehkordi MH (2015) Two verifiable multi secret sharing schemes based on nonhomogeneous linear recursion and LFSR public-key cryptosystem. Inf Sci 294:31–40

    MathSciNet  MATH  Google Scholar 

  33. Nag A, Singh JP, Singh AK (2019) An efficient Boolean based multi-secret image sharing scheme. Multimed Tools Appl

  34. Ou D, Sun W, Wu X (2015) Non-expansible XOR-based visual cryptography scheme with meaningful shares. Signal Process 108:604–621

    Google Scholar 

  35. Ou D, Ye L, Sun W (2015) User-friendly secret image sharing scheme with verification ability based on block truncation coding and error diffusion. Journal of Visual Communication and Image Representation 29:46–60

    Google Scholar 

  36. Prasetyo H, Guo J-M (2019) A note on multiple secret sharing using Chinese remainder theorem and exclusive-OR. IEEE Access 7:37473–37497

    Google Scholar 

  37. Prasetyo H, Hsia C-H (2019) Lossless progressive secret sharing for grayscale and color images. Multimedia Tools and Applications 78:24837–24862

    Google Scholar 

  38. Rajabi B, Eslami Z (2019) A verifiable threshold secret sharing scheme based on lattices. Inf Sci 501:655–661

    MathSciNet  MATH  Google Scholar 

  39. Reyad O, Kotulski Z, Abd-Elhafiez WM (2016) Image encryption using chaos-driven elliptic curve pseudo-random number generators. Applied Mathematics & Information Sciences 10(4):1283–1292

    Google Scholar 

  40. Shao J (2014) Efficient verifiable multi-secret sharing scheme based on hash function. Inf Sci 278:104–109

    MathSciNet  MATH  Google Scholar 

  41. Sheikhi-Garjan M, Bahramian M, Doche C (2019) Threshold verifiable multi-secret sharing based on elliptic curves and Chinese remainder theorem. IET Inf Secur 13(3):278–284

    Google Scholar 

  42. Shivani S (2018) Multi secret sharing with unexpanded meaningful shares. Multimedia Tools and Applications 77(5):6287–6310

    Google Scholar 

  43. Singh P, Raman B, Misra M (2018) A (n, n) threshold non-expansible XOR based visual cryptography with unique meaningful shares. Signal Process 142:301–319

    Google Scholar 

  44. Thien C-C, Lin J-C (2002) Secret image sharing. Computers & Graphics 26(5):765–770

    Google Scholar 

  45. Verma OP, Jain N, Pal SK (2020) A hybrid-based verifiable secret sharing scheme using Chinese remainder theorem. Arabian Journal for Science and Engineering 45:2395–2406

    Google Scholar 

  46. Wang D, Zhang L, Ma N, Li X (2007) Two secret sharing schemes based on Boolean operations. Pattern Recogn 40(10):2776–2785

    MATH  Google Scholar 

  47. Wu K-S (2013) A secret image sharing scheme for light images. EURASIP Journal on Advances in Signal Processing 2013(1):49

    Google Scholar 

  48. Wu T-Y, Tseng Y-M (2011) A pairing-based publicly verifiable secret sharing scheme. J Syst Sci & Complexity 24(1):186–194

    MathSciNet  MATH  Google Scholar 

  49. Yang C-C, Chang T-Y, Hwang M-S (2004) A (t,n) multi-secret sharing scheme. Appl Math Comput 151(2):483–490

    MathSciNet  MATH  Google Scholar 

  50. Zhao J, Zhang J, Zhao R (2007) A practical verifiable multi-secret sharing scheme. Computer Standards & Interfaces 29(1):138–141

    Google Scholar 

  51. Zhao R, Zhao J, Dai F, Zhao F (2009) A new image secret sharing scheme to identify cheaters. Computer Standards & Interfaces 31(1):252–257

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Arup Kumar Chattopadhyay.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chattopadhyay, A.K., Nag, A., Singh, J.P. et al. A verifiable multi-secret image sharing scheme using XOR operation and hash function. Multimed Tools Appl 80, 35051–35080 (2021). https://doi.org/10.1007/s11042-020-09174-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-09174-0

Keywords

Navigation