Abstract
In a secret image sharing (SIS) scheme, a dealer (the data owner or a trusted third-party) encodes a secret image into some share images and distributes them among some participants such that each participant receives exactly one share. Most of the secret image sharing schemes assume a trusted dealer and participants. They do not use any verification of the share images while they are presented for secret reconstruction. In this article, we propose a verifiable multi-secret image sharing scheme using Boolean operations and a secure hash function. We consider n secret images for sharing and convert each secret image to a complete noisy image by using a secure hash function, XOR operations, and a specially designed pseudo-random image-matrix generator function. Then, we use XOR operations to generate the share images. The hash function calls are chained in a unique way to enable reconstruction and verification at a low cost for the secret images. The use of hash function also ensures that secrecy of share images and secret images remains consistent. The experimental results and security analysis prove that the scheme is secure and verifiable.
Similar content being viewed by others
References
Chattopadhyay AK, Ghosh D, Maitra P, Nag A, Saha HN (2018) A verifiable (n, n) secret image sharing scheme using XOR operations. In: Proceedings of 9th IEEE Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), pages 1025–1031. IEEE
Chattopadhyay AK, Maitra P, Saha HN, Nag A (2018) A verifiable multi-secret sharing scheme with elliptic curve cryptography. In: Proceedings of the 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), pages 1374–1379. IEEE
Chen C-C, Wu W-J (2014) A secure Boolean-based multi-secret image sharing scheme. J Syst Softw 92:107–114
Chen C-C, Wu W-J, Chen J-L (2016) Highly efficient and secure multi-secret image sharing scheme. Multimedia Tools and Applications 75(12):7113–7128
Chen D, Lu W, Xing W, Wang N (2019) An efficient verifiable threshold multi-secret sharing scheme with different stages. IEEE Access 7:107104–107110
Chen T-H, Wu C-S (2011) Efficient multi-secret image sharing based on Boolean operations. Signal Process 91(1):90–97
Chen Y-C, Tsai D-S, Horng G (2013) Visual secret sharing with cheating prevention revisited. Digital Signal Processing 23(5):1496–1504
Chen Y-R, Chen L-H (2017) Region image sharing with various secrecy levels. Multimedia Tools and Applications 76(2):1721–1734
Chor B, Goldwasser S, Micali S, Awerbuch B (1985) Verifiable secret sharing and achieving simultaneity in the presence of faults. In: Proceedings of 26th Annual Symposium on Foundations of Computer Science (SFCS 1985), pages 383–395. IEEE
Das A, Adhikari A (2010) An efficient multi-use multi-secret sharing scheme based on hash function. Applied Mathematics Letters 23(9):993–996
Dehkordi MH, Mashhadi S (2008) An efficient threshold verifiable multi-secret sharing. Computer Standards & Interfaces 30(3):187–190
Dehkordi MH, Mashhadi S (2008) New efficient and practical verifiable multi-secret sharing schemes. Information Sciences 178(9):2262–2274
Dehkordi MH, Mashhadi S (2008) Verifiable secret sharing schemes based on non-homogeneous linear recursions and elliptic curves. Computer Communications 31(9):1777–1784
Dehkordi MH, Oraei H (2019) How to construct a verifiable multi-secret sharing scheme based on graded encoding schemes. IET Inf Secur 13(4):343–351
dela Cruz R, Wang H (2013) Cheating-immune secret sharing schemes from codes and cumulative arrays. Cryptography and Communications 5(1):67–83
Deshmukh M, Nain N, Ahmed M (2017) A novel approach for sharing multiple color images by employing Chinese remainder theorem. Journal of Visual Communication and Image Representation 49:291–302
Deshmukh M, Nain N, Ahmed M (2018) Efficient and secure multi secret sharing schemes based on Boolean XOR and arithmetic modulo. Multimedia Tools and Applications 77(1):89–107
Faraoun KM (2017) Design of a new efficient and secure multi-secret images sharing scheme. Multimedia Tools and Applications 76(5):6247–6261
Guo C, Zhang H, Fu Z, Feng B, Li M (2018) A novel proactive secret image sharing scheme based on LISS. Multimedia Tools and Applications 77(15):19569–19590
Harn L, Fuyou M, Chang C-C (2013) Verifiable secret sharing based on the Chinese remainder theorem. Security and Communication Networks 7 (6):950–957
Harn L, Lin C (2009) Detection and identification of cheaters in (t, n) secret sharing scheme. Des Codes Crypt 52(1):15–24
Hu C, Liao X, Cheng X (2012) Verifiable multi-secret sharing based on LFSR sequences. Theoretical Computer Science 445:52–62
Kabirirad S, Eslami Z (2018) A (t, n)-multi secret image sharing scheme based on Boolean operations. Journal of Visual Communication and Image Representation 57:39–47
Kabirirad S, Eslami Z (2019) Improvement of (n, n)-multi-secret image sharing schemes based on Boolean operations. Journal of Information Security and Applications 47:16–27
Kandar S, Dhara BC (2020) A verifiable secret sharing scheme with combiner verification and cheater identification. Journal of Information Security and Applications 51:102430
Kanso A, Ghebleh M (2018) An efficient lossless secret sharing scheme for medical images. J Vis Commun Image Represent 56:245–255
Lin P-Y, Wang R-Z, Chang Y-J, Fang W-P (2015) Prevention of cheating in visual cryptography by using coherent patterns. Inf Sci 301:61–74
Lin T-L, Horng S-J, Lee K-H, Chiu P-L, Kao T-W, Chen Y-H, Run R-S, Lai J-L, Chen R-J (2010) A novel visual secret sharing scheme for multiple secrets without pixel expansion. Expert Syst Appl 37(12):7858–7869
Liu Y, Harn L, Chang C-C (2015) A novel verifiable secret sharing mechanism using theory of numbers and a method for sharing secrets. International Journal of Communication Systems 28(7):1282–1292
Liu Y, Yang C, Wang Y, Zhu L, Ji W (2018) Cheating identifiable secret sharing scheme using symmetric bivariate polynomial. Inf Sci 453:21–29
Liu Y-X, Sun Q-D, Yang C-N (2018) (k,n) secret image sharing scheme capable of cheating detection. EURASIP Journal on Wireless Communications and Networking 72:1–6
Mashhadi S, Dehkordi MH (2015) Two verifiable multi secret sharing schemes based on nonhomogeneous linear recursion and LFSR public-key cryptosystem. Inf Sci 294:31–40
Nag A, Singh JP, Singh AK (2019) An efficient Boolean based multi-secret image sharing scheme. Multimed Tools Appl
Ou D, Sun W, Wu X (2015) Non-expansible XOR-based visual cryptography scheme with meaningful shares. Signal Process 108:604–621
Ou D, Ye L, Sun W (2015) User-friendly secret image sharing scheme with verification ability based on block truncation coding and error diffusion. Journal of Visual Communication and Image Representation 29:46–60
Prasetyo H, Guo J-M (2019) A note on multiple secret sharing using Chinese remainder theorem and exclusive-OR. IEEE Access 7:37473–37497
Prasetyo H, Hsia C-H (2019) Lossless progressive secret sharing for grayscale and color images. Multimedia Tools and Applications 78:24837–24862
Rajabi B, Eslami Z (2019) A verifiable threshold secret sharing scheme based on lattices. Inf Sci 501:655–661
Reyad O, Kotulski Z, Abd-Elhafiez WM (2016) Image encryption using chaos-driven elliptic curve pseudo-random number generators. Applied Mathematics & Information Sciences 10(4):1283–1292
Shao J (2014) Efficient verifiable multi-secret sharing scheme based on hash function. Inf Sci 278:104–109
Sheikhi-Garjan M, Bahramian M, Doche C (2019) Threshold verifiable multi-secret sharing based on elliptic curves and Chinese remainder theorem. IET Inf Secur 13(3):278–284
Shivani S (2018) Multi secret sharing with unexpanded meaningful shares. Multimedia Tools and Applications 77(5):6287–6310
Singh P, Raman B, Misra M (2018) A (n, n) threshold non-expansible XOR based visual cryptography with unique meaningful shares. Signal Process 142:301–319
Thien C-C, Lin J-C (2002) Secret image sharing. Computers & Graphics 26(5):765–770
Verma OP, Jain N, Pal SK (2020) A hybrid-based verifiable secret sharing scheme using Chinese remainder theorem. Arabian Journal for Science and Engineering 45:2395–2406
Wang D, Zhang L, Ma N, Li X (2007) Two secret sharing schemes based on Boolean operations. Pattern Recogn 40(10):2776–2785
Wu K-S (2013) A secret image sharing scheme for light images. EURASIP Journal on Advances in Signal Processing 2013(1):49
Wu T-Y, Tseng Y-M (2011) A pairing-based publicly verifiable secret sharing scheme. J Syst Sci & Complexity 24(1):186–194
Yang C-C, Chang T-Y, Hwang M-S (2004) A (t,n) multi-secret sharing scheme. Appl Math Comput 151(2):483–490
Zhao J, Zhang J, Zhao R (2007) A practical verifiable multi-secret sharing scheme. Computer Standards & Interfaces 29(1):138–141
Zhao R, Zhao J, Dai F, Zhao F (2009) A new image secret sharing scheme to identify cheaters. Computer Standards & Interfaces 31(1):252–257
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Chattopadhyay, A.K., Nag, A., Singh, J.P. et al. A verifiable multi-secret image sharing scheme using XOR operation and hash function. Multimed Tools Appl 80, 35051–35080 (2021). https://doi.org/10.1007/s11042-020-09174-0
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-09174-0