Skip to main content
Log in

RETRACTED ARTICLE: Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

This article was retracted on 13 June 2023

This article has been updated

Abstract

Secret Image Sharing (SIS) scheme is to encrypt a secret image into ‘n’ specious shadows. It is unable to reveal any data on the secret image if at least one of the shadows is not achieved. In this paper, wavelet-based secret image sharing scheme is proposed with encrypted shadow images using optimal Homomorphic Encryption (HE) technique. Initially, Discrete Wavelet Transform (DWT) is applied on the secret image to produce sub bands. From this process, multiple shadows are created, encrypted and decrypted for each shadow. The encrypted shadow can be recovered just by choosing some subset of these ‘n’ shadows that makes transparent and stack over each other. To improve the shadow security, each shadow is encrypted and decrypted using HE technique. For the concern on image quality, the new Oppositional based Harmony Search (OHS) algorithm was utilized to generate the optimal key. From the analysis, it shows that the proposed scheme provide greater security compared to other existing schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Change history

References

  • Baghel SS, Goyal A (2016) Improved the security strength of visual cryptography using feature-based watermarking technique. Int J Comput Appl 153(11):9–13

    Google Scholar 

  • Banik BG, Bandyopadhyay SK (2015) Secret sharing using 3 level DWT method of image steganography based on Lorenz chaotic encryption and visual cryptography. In: Computational Intelligence and Communication Networks (CICN), 2015 International Conference on IEEE, pp 1147–1152

  • Challa R, Vijayakumar G, Sunny B (2015). Secure image processing using LWE based homomorphic encryption. In: Electrical, Computer and Communication Technologies (ICECCT), 2015 IEEE International Conference on IEEE, pp 1–6

  • Dardzinska-Glebocka A (2007) Optimization algorithm and data security problem in distributed information systems. In: Signal-image technologies and internet-based system, 2007. SITIS’07. Third International IEEE Conference on IEEE, pp 116–120

  • Dasgupta S, Pal SK (2016) Design of a polynomial ring based symmetric homomorphic encryption scheme. Perspect Sci 8:692–695

    Article  Google Scholar 

  • Dayanand IE, Kumar RS (2014) Analysis of secret image sharing using shared image. Int J Comput Appl 108(7):35–39

    Google Scholar 

  • Dharwadkar NV, Amberker BB (2010) Watermarking scheme for color images using wavelet transform based texture properties and secret sharing. Int J Signal Process 6(2):93–100

    Google Scholar 

  • Elhoseny M, Yuan X, ElMinir HK, Riad AM (2016a) An energy efficient encryption method for secure dynamic WSN. Secur Commun Netw 9(13):2024–2031

    Google Scholar 

  • Elhoseny M, Elminir H, Riad A, Yuan X (2016b) A secure data routing schema for WSN using elliptic curve cryptography and homomorphic encryption. J King Saud Univ Comput Inf Sci 28(3):262–275. https://doi.org/10.1016/j.jksuci.2015.11.001

    Article  Google Scholar 

  • Elhoseny M, Hosny A, Hassanien AE, Muhammad K, AK Sangaiah (2017) Secure automated forensic investigation for sustainable critical infrastructures compliant with green computing requirements. IEEE Trans Sustain Comput:. https://doi.org/10.1109/TSUSC.2017.2782737

    Article  Google Scholar 

  • Gupta D, Choubey S (2015) The discrete wavelet transforms for image processing. Int J Emerg Technol Adv Eng 4(3):598–602

    Google Scholar 

  • Houssein EH, Ali MA, Hassanien AE (2016) An image steganography algorithm using haar discrete wavelet transform with advanced encryption system. In: Computer Science and Information Systems (FedCSIS), 2016 Federated Conference on IEEE, pp 641–644

  • Jiang Q, Chen Z, Li B, Shen J, Yang L, Ma J (2018) Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems. J Ambient Intell Humaniz Comput 9(4):1061–1073. https://doi.org/10.1007/s12652-017-0516-2

    Article  Google Scholar 

  • Karolin M, Meyyapan DT (2015) RGB based secret sharing scheme in color visual cryptography. Int J Adv Res Comput Commun Eng 4(7):151–155

    Google Scholar 

  • Kumar C, Singh AK, Kumar P (2018a) Improved wavelet-based image watermarking through SPIHT. Multimed Tools Appl:. https://doi.org/10.1007/s11042-018-6177-0

    Article  Google Scholar 

  • Kumar C, Singh AK, Kumar P, Singh R, Singh S 2018b SPIHT-based multiple image watermarking in NSCT domain. Concurr Comput Pract Exp. https://doi.org/10.1002/cpe.4912

    Article  Google Scholar 

  • Kumari S, Karuppiah M, Das AK, Li X, Wu F, Gupta V (2018) Design of a secure anonymity-preserving authentication scheme for session initiation protocol using elliptic curve cryptography. J Ambient Intell Humaniz Comput 9(3):643–653. https://doi.org/10.1007/s12652-017-0460-1

    Article  Google Scholar 

  • Kuppusamy K, Thamodaran K (2013) Optimized hybrid security mechanism for image authentication and secrecy using PSO. Int J Netw Secur Appl 5(5):115–128

    Google Scholar 

  • Linju PS, Mathews S (2016) An efficient interception mechanism against cheating in visual cryptography with non pixel expansion of images. Int J Sci Technol Res 5(01):102–106

    Google Scholar 

  • Liu J, Ke L (2018) New efficient identity based encryption without pairings. J Ambient Intell Humaniz Comput.. https://doi.org/10.1007/s12652-018-0756-9

    Article  Google Scholar 

  • Mishra DC, Sharma RK (2014) Application of algebra and discrete wavelet transform in two-dimensional data (RGB-images) security. Int J Wavelets Multiresolut Inf Process 12(06):1450040–1450041

    Article  MathSciNet  MATH  Google Scholar 

  • Nagdive MPS, Raut AB (2015) Image visual cryptography by using haar wavelet-based decomposition. Int J Adv Res Comput Eng Technol 4(4):1261–1265

    Google Scholar 

  • Nazimul Islam Gupta D, Choubey S (2015) Security improvement of image by visual cryptography using super imposed wavelet transform in image processing. Int J Adv Res Comput Sci Softw Eng 5(5):498–503

    Google Scholar 

  • NouraMetawaa M, KabirHassana, Elhoseny M (2017) Genetic algorithm based model for optimizing bank lending decisions. Expert Syst Appl 80:75–82

    Article  Google Scholar 

  • Pang CJ (2009) An image encryption algorithm based on discrete wavelet transform and two dimension cat mapping. In: Networks security, wireless communications and trusted computing, 2009. NSWCTC’09. International Conference on (Vol 2, pp 711–714). IEEE

  • Rani MMS, Mary GG (2016) Enhancement of RGB shares of visual cryptography using PSO. Int J Comput Sci Inf Secur 14(9):938

    Google Scholar 

  • Reddy GT, Meenakshi N (2014) Extended and embedded visual cryptography. Int J Comput Sci Mob Comput 3(2):235–247

    Google Scholar 

  • Revathy S (2014) Secure crypto system for image encryption and data embedding using chaos and BB equation algorithm. Int J Comput Sci Mob Comput 3(3):297–306

    Google Scholar 

  • Sanyasi Naidu P, Kharat R, Tekade R, Mendhe P, Magade V (2016) E-voting system using visual cryptography & secure multi-party computation. In: 2016 International Conference on IEEE Computing Communication Control and automation (ICCUBEA). IEEE, Pune, pp 1–4

  • Shaheen AM, Sheltami TR, Al-Kharoubi TM, Shakshuki E (2018) Digital image encryption techniques for wireless sensor networks using image transformation methods. DCT and DWT. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-018-0850-z

    Article  Google Scholar 

  • Shankar K, Eswaran P (2015a) ECC based image encryption scheme with aid of optimization technique using differential evolution algorithm. Int J ApplEng Res 10(55):1841–1845

    Google Scholar 

  • Shankar K, Eswaran P (2015b) Sharing a secret image with encapsulated shares in visual cryptography. Procedia Comput Sci 70:462–468

    Article  Google Scholar 

  • Shankar K, Eswaran P (2015c) A secure visual secret share (VSS) creation scheme in visual cryptography using elliptic curve cryptography with optimization technique. Aust J Basic Appl Sci 9(36):150–163

    Google Scholar 

  • Shankar K, Eswaran P (2016a) RGB-based secure share creation in visual cryptography using optimal elliptic curve cryptography technique. J Circuits Syst Comput 25(11):1650138

    Article  Google Scholar 

  • Shankar K, Eswaran P (2016b) A new k out of n secret image sharing scheme in visual cryptography. In: 2016 10th International conference on intelligent systems and control (ISCO). IEEE, pp 1–6

  • Shankar K, Eswaran P (2016c) An efficient image encryption technique based on optimized key generation in ECC using genetic algorithm. In: Artificial intelligence and evolutionary computations in engineering systems. Springer, New Delhi, pp 705–714

    Chapter  Google Scholar 

  • Shankar K, Eswaran P (2017) RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography. China Commun 14(2):118–130

    Article  Google Scholar 

  • Shankar K, Lakshmanaprabu SK (2018) Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm. Int J Eng Technol 7(1.9):22–27

    Article  Google Scholar 

  • Singh AK, Kumar B, Singh SK, Ghrera SP, Mohan A (2016) Multiple watermarking technique for securing online social network contents using back propagation neural network. Future Gener Comput Syst 86:926–939. https://doi.org/10.1016/j.future.2016.11.023

    Article  Google Scholar 

  • Singh L, Singh AK, Singh PK (2018) Secure data hiding techniques: a survey. Multimed Tools Appl,. https://doi.org/10.1007/s11042-018-6407-5

    Article  Google Scholar 

  • Sokouti M, Zakerolhosseini A, Sokouti B (2016) Medical image encryption: an application for improved padding based GGH encryption algorithm. Open Med Inform J 10:11–22

    Article  Google Scholar 

  • Srivastava R, Kumar B, Singh AK, Mohan A (2018) Computationally efficient joint imperceptible image watermarking and JPEG compression: a green computing approach. Multimed Tools Appl 77(13):16447–16459. https://doi.org/10.1007/s11042-017-5214-8

    Article  Google Scholar 

  • Talarposhti KM, andJamei MK (2016) A secure image encryption method based on dynamic harmony search (DHS) combined with the chaotic map. Opt Lasers Eng 81:21–34

    Article  Google Scholar 

  • Thakur S, Singh AK, Ghrera SP, Mohamed Elhoseny (2018a) Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimed Tools Appl:. https://doi.org/10.1007/s11042-018-6263-3

    Article  Google Scholar 

  • Thakur S, Singh AK, Ghrera SP, Mohan A (2018b) Chaotic based secure watermarking approach for medical images. Multimed Tools Appl:. https://doi.org/10.1007/s11042-018-6691-0

    Article  Google Scholar 

  • Toughi S, Fathi MH, Sekhavat YA (2017) An image encryption scheme based on elliptic curve pseudo-random and advanced encryption system. Signal Process 141:217–227

    Article  Google Scholar 

  • Vengadapurvaja AM, Nisha G, Aarthy R, Sasikaladevi N (2017) An efficient homomorphic medical image encryption algorithm for cloud storage security. Procedia Comput Sci 115:643–650

    Article  Google Scholar 

  • Younes MAB (2016) Literature survey on different techniques of image encryption. J Sci Eng Res 7(1):93–98

    Google Scholar 

  • Zhang Q, Xu D (2018) Security authentication technology based on dynamic Bayesian network in Internet of Things. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-018-0949-2

    Article  Google Scholar 

  • Zhang J, Wang B, Xhafa F, Wang XA, Li C (2017) Energy-efficient secure outsourcing decryption of attribute based encryption for mobile device in cloud computation. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-017-0658-2

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohamed Elhoseny.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article has been retracted. Please see the retraction notice for more detail: https://doi.org/10.1007/s12652-023-04654-1

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shankar, K., Elhoseny, M., Kumar, R.S. et al. RETRACTED ARTICLE: Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. J Ambient Intell Human Comput 11, 1821–1833 (2020). https://doi.org/10.1007/s12652-018-1161-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-018-1161-0

Keywords

Navigation