Abstract
Traditional k out of n visual cryptography scheme has been proposed to encrypt single secret image into n shares where only k or more shares can decode the secret image. Many existing schemes on visual cryptography are restricted to consider only binary images as secret which are not appropriate for many important applications. Store-and-Forward telemedicine is one such application where medical images are transmitted from one site to another via electronic medium to analyze the patient’s clinical health status. The main objective of Store-and-Forward telemedicine is to provide remote clinical services via two-way communication between the patient and the healthcare provider using electronic medical image, audio and video means. In this paper, a new XOR based Continuous-tone Multi Secret Sharing scheme suitable for store-and-forward telemedicine is proposed to securely transmit the medical images. It also eliminates basic security constraints of VC like pixel expansion in shares/recovered secret images, random pattern of shares, explicit codebook requirement, lossy recovery of secret and limitation on number of secret and shares. Proposed approach is n out of n multi secret sharing scheme which is able to transmit n secret images simultaneously. All secrets could be revealed only after some computations with all n shares and one master share. Master share has been created with the secret key at encoding phase and it can be regenerated at the time of decoding using same secret key. Here all shares are meaningful in continuous-tone which may provide confidentiality to medical images during transmission. Proposed approach not only preserves all basic characteristics of traditional VC but also increases the capacity of secret image sharing. From the experiments we found that irrespective of visible contents of the shares, the probability of getting back the pixel values of respective original secret images at the receiver end is very high.
Similar content being viewed by others
References
Abdul-Aziz Gutub A, Abdul-Aziz Khan F (2012) Hybrid crypto hardware utilizing symmetric-key & public-key cryptosystems. In: Proceeding of international conference on advanced computer science applications and technologies, pp 116–121
Abdul-Aziz Gutub A, Khan EA (2011) Using subthreshold SRAM to design Low-Power crypto hardware. In: International journal on new computer architectures and their applications (IJNCAA), vol 1(2), pp 474–483
Abu-Marie W, Gutub A, Abu-Mansour H (2010) Image based steganography using truth table based and determinate array on RGB indicator. Int J Sign Imag Process 1:196–204
Al-Otaibi N A (2014) 2-leyer security system for hiding sensitive text data on personal computers. In: Proceeding of the 3rd international conference on advancements in information technology (ICAIT 2014), pp 73–79
Blundo C, Santis AD, Naor M (2000) Visual cryptography for grey level images. J Inf Process Lett 75(6):255–259
Chen C-C, Wu W-J (2014) A secure Boolean-based multi-secret image sharing scheme. J Syst Softw 92:107–114
Chen C-C, Wu W-J (2014) A secure Boolean-based multi-secret image sharing scheme. J Syst Softw 92:107–114
Chen T-H, Wu C-S (2011) Efficient multi-secret image sharing based on Boolean operations. Signal Process 91.1:90–97
Feng JB, Wu HC, Tsai CS, Chang YF, Chu YP (2008) Visual secret sharing for multiple secrets. Pattern Recogn 41:3572–3581
Gutub A, Al-Qahtani A, Tabakh A (2009) Triple-A: secure RGB image steganography based on randomization. In: 7th ACS/IEEE international conference on computer systems and applications, pp 400–403
Hsu H-C, Chen T-S, Lin Y-H (2004) The ring shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharing. In: Proceedings of the IEEE international conference on networking, sensing and control, Taipei, Taiwan, pp 996–1001
Khan F, Abdul-Aziz Gutub A (2007) Message concealment techniques using image based steganography. In: Proceeding of 4th IEEE GCC conference and exhibition, gulf international convention centre, Manamah, Bahrain, 11-14 November, pp 1–6
Liu F, Wu CK (2010) Optimal xor based (2,n) visual cryptography schemes. In: IACR Cryptol, 545, eprint archive
Naor M, Shamir A (1995) Visual cryptography. In: Advances in cryptograhy: EUROCRYPT94, LNCS, vol 950, pp 1–12
Shyu SJ, Huang S-Y, Lee Y-K, Wang R-Z, Chen K (2007) Sharing multiple secrets in visual cryptography. Pattern Recogn 40:3633–3651
Taghaddos D, Latif A (2014) Visual cryptography for gray-scale images using bit-level. In: Journal of information hiding and multimedia signal processing, ubiquitous international, vol 5(1), pp 90– 98
Tuyls P, Hollmann H, Lint J, Tolhuizen L (2005) Xor-based visual cryptography schemes. Des Codes Crypt 37(1):169–186
Tuyls P, Hollmann HD, VanLint JH, Tolhuizen L (2005) XOR-Based visual cryptography schemes. Des Codes Crypt 37:169–186
Wang D-S, Song T, Dong L, Yang C-N (2013) Optimal contrast grayscale visual cryptography schemes with reversing. IEEE Trans Inf Forensics Secur 8(12):2059–2072
Wu CC, Chen LH (1998) A study on visual cryptography. Master Thesis. PhD thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R.O.C
Wu H-C, Chang C-C (2005) Sharing visual multi-secrets using circle shares. Comput Stand Interfaces 134(28):123–135
Wu X, Ou D, Dai L, Sun W (2013) XOR based meaningful visual secret sharing by generalized random grids. In: Proceedings of the first ACM workshop on information hiding and multimedia security ACM, pp 181–190
Wu X, Sun W (2013) Generalized random grid and its applications in visual cryptography. IEEE Trans Inf Forensics Secur 8(9):1541–1553
Wu X, Sun W (2013) Random grid-based visual secret sharing with abilities of or and xor decryptions. J Vis Commun Image Represent 24(1):48–62
Yamaguchi Y (2015) Extended visual cryptography for continuous-tone images: effect of the optimum tone mapping. Int J Inf Commun Technol 7(1):25–39
Yang C-N, Chen C-H, Cai S-R (2015) Enhanced Boolean-based multi secret image sharing scheme. J Syst Softw 116:22–34
Yang CN, Wang DS (2014) Property analysis of XOR-based visual cryptography. IEEE Trans Circuits Syst Video Technol 24(2):189–197
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Shivani, S., Rajitha, B. & Agarwal, S. XOR based continuous-tone multi secret sharing for store-and-forward telemedicine. Multimed Tools Appl 76, 3851–3870 (2017). https://doi.org/10.1007/s11042-016-4012-z
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-016-4012-z