Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

A novel secret image sharing scheme using large primes

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

A secret image sharing scheme is any method of distributing shares of a secret image amongst a set of peers, such that the secret may be revealed only with participation of all members of a qualified set of peers. Following Shamir’s (t, n)–threshold scheme, we propose a novel lossy/lossless secret image sharing scheme, that improves existing schemes in terms of security and performance. As opposed to the usual convention of representing a digital image by a collection of 8–bit integer values, we consider 8b–bit values where b is a positive integer. This approach accommodates a larger finite field, which in turn produces a less intrusive secret image sharing scheme. Extensive empirical results are presented to demonstrate the efficiency and robustness of the proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

References

  1. Blakley GR (1979) Safeguarding cryptographic keys, IEEE

  2. Chang C-C, Hsieh Y-P, Lin C-H (2008) Sharing secrets in stego images with authentication. Pattern Recogn 41(10):3130–3137

    Article  MATH  Google Scholar 

  3. Chang C-C, Huynh N-T, Le H-D (2014) Lossless and unlimited multi-image sharing based on chinese remainder theorem and lagrange interpolation. Signal Process 99:159–170

    Article  Google Scholar 

  4. Chang C-C, Lin P-Y, Wang ZH, Li MC (2010) A sudoku-based secret image sharing scheme with reversibility. J Commun 5(1):5–12

    Article  Google Scholar 

  5. Chen Y-R, Chen L-H, Shyu SJ (2015) Secret image sharing with smaller shadow sizes for general access structures. Multimedia Tools and Applications :1–17

  6. Ghebleh M, Kanso A (2014) A robust chaotic algorithm for digital image steganography. Commun Nonlinear Sci Numer Simul 19(6):1898–1907

    Article  Google Scholar 

  7. Guo C, Chang C-C, Qin C (2014) A novel (n, t, n) secret image sharing scheme without a trusted third party. Multimedia Tools and Applications 72(3):2195–2209

    Article  Google Scholar 

  8. http://commons.wikimedia.org/wiki/File:Olym_coast4full_(beach_near_ozette_river).eps. Accessed: February 8, 2016

  9. http://commons.wikimedia.org/wiki/File:Panchlingeshvara_temple_at_Govindanahalli_southern_wall_relief_carvings.eps. Accessed: February 8, 2016

  10. Kanso A, Ghebleh M (2016) An efficient (t,n)–threshold secret image sharing scheme, Multimedia Tools and Applications. doi:10.1007/s11042-016-3917-x

  11. Lee G-J, Yoon E-J, Kim C, Yoo K-Y (2016) A real-time secret image sharing with fairness. J Real-Time Image Proc :1–8

  12. Lin C-C, Tsai W-H (2004) Secret image sharing with steganography and authentication. J Syst Softw 73(3):405–414

    Article  Google Scholar 

  13. Liu L, Wang A, Chang C-C, Li Z (2014) A novel real-time and progressive secret image sharing with flexible shadows based on compressive sensing. Signal Process Image Commun 29(1):128–134

    Article  Google Scholar 

  14. Rukhin A, Soto J, Nechvatal J, Smid M, Barker E, Leigh S, Levenson M, Vangel M, Banks D, Heckert A, Dray J, Vo S (2010) A statistical test suite for random and pseudorandom number generators for cryptographic applications. NIST Special Publication 800–22 Revision 1a

  15. Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613

    Article  MathSciNet  MATH  Google Scholar 

  16. Shannon CE (1951) Prediction and entropy of printed english. Bell Syst Tech J 30(1):50–64

    Article  MATH  Google Scholar 

  17. Thien C-C, Lin J-C (2002) Secret image sharing. Comput Graph 26(5):765–770

    Article  Google Scholar 

  18. Wang R-Z, Su C-H (2006) Secret image sharing with smaller shadow images. Pattern Recogn Lett 27(6):551–555

    Article  Google Scholar 

  19. Wang R-Z, Shyu S-J (2007) Scalable secret image sharing. Signal Process Image Commun 22(4):363–373

    Article  Google Scholar 

  20. Wu K-S (2013) A secret image sharing scheme for light images. EURASIP Journal on Advances in Signal Processing 2013(1):1–5

    Article  Google Scholar 

  21. Wu Y-S, Thien C-C, Lin J-C (2004) Sharing and hiding secret images with size constraint. Pattern Recogn 37(7):1377–1385

    Article  Google Scholar 

  22. Wu Y, Noonan JP, Agaian S (2011) NPCR And UACI randomness tests for image encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT) :31–38

  23. Yang C-N, Li P, Wu C-C, Cai S-R (2015) Reducing shadow size in essential secret image sharing by conjunctive hierarchical approach. Signal Process Image Commun 31:1–9

    Article  Google Scholar 

  24. Zhao R, Zhao J-j, Dai F, Zhao F-q (2009) A new image secret sharing scheme to identify cheaters. Computer Standards & Interfaces 31(1):252–257

    Article  Google Scholar 

Download references

Acknowledgment

The authors are thankful to the anonymous referees for their valuable feedback on the manuscript.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammad Ghebleh.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ghebleh, M., Kanso, A. A novel secret image sharing scheme using large primes. Multimed Tools Appl 77, 11903–11923 (2018). https://doi.org/10.1007/s11042-017-4841-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4841-4

Keywords

Navigation