Abstract
A secret image sharing scheme is any method of distributing shares of a secret image amongst a set of peers, such that the secret may be revealed only with participation of all members of a qualified set of peers. Following Shamir’s (t, n)–threshold scheme, we propose a novel lossy/lossless secret image sharing scheme, that improves existing schemes in terms of security and performance. As opposed to the usual convention of representing a digital image by a collection of 8–bit integer values, we consider 8b–bit values where b is a positive integer. This approach accommodates a larger finite field, which in turn produces a less intrusive secret image sharing scheme. Extensive empirical results are presented to demonstrate the efficiency and robustness of the proposed scheme.
Similar content being viewed by others
References
Blakley GR (1979) Safeguarding cryptographic keys, IEEE
Chang C-C, Hsieh Y-P, Lin C-H (2008) Sharing secrets in stego images with authentication. Pattern Recogn 41(10):3130–3137
Chang C-C, Huynh N-T, Le H-D (2014) Lossless and unlimited multi-image sharing based on chinese remainder theorem and lagrange interpolation. Signal Process 99:159–170
Chang C-C, Lin P-Y, Wang ZH, Li MC (2010) A sudoku-based secret image sharing scheme with reversibility. J Commun 5(1):5–12
Chen Y-R, Chen L-H, Shyu SJ (2015) Secret image sharing with smaller shadow sizes for general access structures. Multimedia Tools and Applications :1–17
Ghebleh M, Kanso A (2014) A robust chaotic algorithm for digital image steganography. Commun Nonlinear Sci Numer Simul 19(6):1898–1907
Guo C, Chang C-C, Qin C (2014) A novel (n, t, n) secret image sharing scheme without a trusted third party. Multimedia Tools and Applications 72(3):2195–2209
http://commons.wikimedia.org/wiki/File:Olym_coast4full_(beach_near_ozette_river).eps. Accessed: February 8, 2016
http://commons.wikimedia.org/wiki/File:Panchlingeshvara_temple_at_Govindanahalli_southern_wall_relief_carvings.eps. Accessed: February 8, 2016
Kanso A, Ghebleh M (2016) An efficient (t,n)–threshold secret image sharing scheme, Multimedia Tools and Applications. doi:10.1007/s11042-016-3917-x
Lee G-J, Yoon E-J, Kim C, Yoo K-Y (2016) A real-time secret image sharing with fairness. J Real-Time Image Proc :1–8
Lin C-C, Tsai W-H (2004) Secret image sharing with steganography and authentication. J Syst Softw 73(3):405–414
Liu L, Wang A, Chang C-C, Li Z (2014) A novel real-time and progressive secret image sharing with flexible shadows based on compressive sensing. Signal Process Image Commun 29(1):128–134
Rukhin A, Soto J, Nechvatal J, Smid M, Barker E, Leigh S, Levenson M, Vangel M, Banks D, Heckert A, Dray J, Vo S (2010) A statistical test suite for random and pseudorandom number generators for cryptographic applications. NIST Special Publication 800–22 Revision 1a
Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613
Shannon CE (1951) Prediction and entropy of printed english. Bell Syst Tech J 30(1):50–64
Thien C-C, Lin J-C (2002) Secret image sharing. Comput Graph 26(5):765–770
Wang R-Z, Su C-H (2006) Secret image sharing with smaller shadow images. Pattern Recogn Lett 27(6):551–555
Wang R-Z, Shyu S-J (2007) Scalable secret image sharing. Signal Process Image Commun 22(4):363–373
Wu K-S (2013) A secret image sharing scheme for light images. EURASIP Journal on Advances in Signal Processing 2013(1):1–5
Wu Y-S, Thien C-C, Lin J-C (2004) Sharing and hiding secret images with size constraint. Pattern Recogn 37(7):1377–1385
Wu Y, Noonan JP, Agaian S (2011) NPCR And UACI randomness tests for image encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT) :31–38
Yang C-N, Li P, Wu C-C, Cai S-R (2015) Reducing shadow size in essential secret image sharing by conjunctive hierarchical approach. Signal Process Image Commun 31:1–9
Zhao R, Zhao J-j, Dai F, Zhao F-q (2009) A new image secret sharing scheme to identify cheaters. Computer Standards & Interfaces 31(1):252–257
Acknowledgment
The authors are thankful to the anonymous referees for their valuable feedback on the manuscript.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Ghebleh, M., Kanso, A. A novel secret image sharing scheme using large primes. Multimed Tools Appl 77, 11903–11923 (2018). https://doi.org/10.1007/s11042-017-4841-4
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-017-4841-4