Nothing Special   »   [go: up one dir, main page]

Skip to main content

Advertisement

Log in

XOR based continuous-tone multi secret sharing for store-and-forward telemedicine

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Traditional k out of n visual cryptography scheme has been proposed to encrypt single secret image into n shares where only k or more shares can decode the secret image. Many existing schemes on visual cryptography are restricted to consider only binary images as secret which are not appropriate for many important applications. Store-and-Forward telemedicine is one such application where medical images are transmitted from one site to another via electronic medium to analyze the patient’s clinical health status. The main objective of Store-and-Forward telemedicine is to provide remote clinical services via two-way communication between the patient and the healthcare provider using electronic medical image, audio and video means. In this paper, a new XOR based Continuous-tone Multi Secret Sharing scheme suitable for store-and-forward telemedicine is proposed to securely transmit the medical images. It also eliminates basic security constraints of VC like pixel expansion in shares/recovered secret images, random pattern of shares, explicit codebook requirement, lossy recovery of secret and limitation on number of secret and shares. Proposed approach is n out of n multi secret sharing scheme which is able to transmit n secret images simultaneously. All secrets could be revealed only after some computations with all n shares and one master share. Master share has been created with the secret key at encoding phase and it can be regenerated at the time of decoding using same secret key. Here all shares are meaningful in continuous-tone which may provide confidentiality to medical images during transmission. Proposed approach not only preserves all basic characteristics of traditional VC but also increases the capacity of secret image sharing. From the experiments we found that irrespective of visible contents of the shares, the probability of getting back the pixel values of respective original secret images at the receiver end is very high.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Abdul-Aziz Gutub A, Abdul-Aziz Khan F (2012) Hybrid crypto hardware utilizing symmetric-key & public-key cryptosystems. In: Proceeding of international conference on advanced computer science applications and technologies, pp 116–121

  2. Abdul-Aziz Gutub A, Khan EA (2011) Using subthreshold SRAM to design Low-Power crypto hardware. In: International journal on new computer architectures and their applications (IJNCAA), vol 1(2), pp 474–483

  3. Abu-Marie W, Gutub A, Abu-Mansour H (2010) Image based steganography using truth table based and determinate array on RGB indicator. Int J Sign Imag Process 1:196–204

    Google Scholar 

  4. Al-Otaibi N A (2014) 2-leyer security system for hiding sensitive text data on personal computers. In: Proceeding of the 3rd international conference on advancements in information technology (ICAIT 2014), pp 73–79

  5. Blundo C, Santis AD, Naor M (2000) Visual cryptography for grey level images. J Inf Process Lett 75(6):255–259

    Article  MathSciNet  MATH  Google Scholar 

  6. Chen C-C, Wu W-J (2014) A secure Boolean-based multi-secret image sharing scheme. J Syst Softw 92:107–114

    Article  Google Scholar 

  7. Chen C-C, Wu W-J (2014) A secure Boolean-based multi-secret image sharing scheme. J Syst Softw 92:107–114

    Article  Google Scholar 

  8. Chen T-H, Wu C-S (2011) Efficient multi-secret image sharing based on Boolean operations. Signal Process 91.1:90–97

    Article  MATH  Google Scholar 

  9. Feng JB, Wu HC, Tsai CS, Chang YF, Chu YP (2008) Visual secret sharing for multiple secrets. Pattern Recogn 41:3572–3581

    Article  MATH  Google Scholar 

  10. Gutub A, Al-Qahtani A, Tabakh A (2009) Triple-A: secure RGB image steganography based on randomization. In: 7th ACS/IEEE international conference on computer systems and applications, pp 400–403

  11. Hsu H-C, Chen T-S, Lin Y-H (2004) The ring shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharing. In: Proceedings of the IEEE international conference on networking, sensing and control, Taipei, Taiwan, pp 996–1001

  12. Khan F, Abdul-Aziz Gutub A (2007) Message concealment techniques using image based steganography. In: Proceeding of 4th IEEE GCC conference and exhibition, gulf international convention centre, Manamah, Bahrain, 11-14 November, pp 1–6

  13. Liu F, Wu CK (2010) Optimal xor based (2,n) visual cryptography schemes. In: IACR Cryptol, 545, eprint archive

  14. Naor M, Shamir A (1995) Visual cryptography. In: Advances in cryptograhy: EUROCRYPT94, LNCS, vol 950, pp 1–12

  15. Shyu SJ, Huang S-Y, Lee Y-K, Wang R-Z, Chen K (2007) Sharing multiple secrets in visual cryptography. Pattern Recogn 40:3633–3651

    Article  MATH  Google Scholar 

  16. Taghaddos D, Latif A (2014) Visual cryptography for gray-scale images using bit-level. In: Journal of information hiding and multimedia signal processing, ubiquitous international, vol 5(1), pp 90– 98

  17. Tuyls P, Hollmann H, Lint J, Tolhuizen L (2005) Xor-based visual cryptography schemes. Des Codes Crypt 37(1):169–186

    Article  MathSciNet  MATH  Google Scholar 

  18. Tuyls P, Hollmann HD, VanLint JH, Tolhuizen L (2005) XOR-Based visual cryptography schemes. Des Codes Crypt 37:169–186

    Article  MathSciNet  MATH  Google Scholar 

  19. Wang D-S, Song T, Dong L, Yang C-N (2013) Optimal contrast grayscale visual cryptography schemes with reversing. IEEE Trans Inf Forensics Secur 8(12):2059–2072

    Article  Google Scholar 

  20. Wu CC, Chen LH (1998) A study on visual cryptography. Master Thesis. PhD thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R.O.C

  21. Wu H-C, Chang C-C (2005) Sharing visual multi-secrets using circle shares. Comput Stand Interfaces 134(28):123–135

    Article  Google Scholar 

  22. Wu X, Ou D, Dai L, Sun W (2013) XOR based meaningful visual secret sharing by generalized random grids. In: Proceedings of the first ACM workshop on information hiding and multimedia security ACM, pp 181–190

  23. Wu X, Sun W (2013) Generalized random grid and its applications in visual cryptography. IEEE Trans Inf Forensics Secur 8(9):1541–1553

    Article  Google Scholar 

  24. Wu X, Sun W (2013) Random grid-based visual secret sharing with abilities of or and xor decryptions. J Vis Commun Image Represent 24(1):48–62

    Article  Google Scholar 

  25. Yamaguchi Y (2015) Extended visual cryptography for continuous-tone images: effect of the optimum tone mapping. Int J Inf Commun Technol 7(1):25–39

    Google Scholar 

  26. Yang C-N, Chen C-H, Cai S-R (2015) Enhanced Boolean-based multi secret image sharing scheme. J Syst Softw 116:22–34

    Article  Google Scholar 

  27. Yang CN, Wang DS (2014) Property analysis of XOR-based visual cryptography. IEEE Trans Circuits Syst Video Technol 24(2):189–197

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shivendra Shivani.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shivani, S., Rajitha, B. & Agarwal, S. XOR based continuous-tone multi secret sharing for store-and-forward telemedicine. Multimed Tools Appl 76, 3851–3870 (2017). https://doi.org/10.1007/s11042-016-4012-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-4012-z

Keywords

Navigation