Advertisement

A new multi-secret image sharing scheme based on DCT

  • Oinam Bidyapati ChanuEmail author
  • Arambam Neelima
Original Article
  • 6 Downloads

Abstract

Multi-secret image sharing scheme (MSIS) is a technique to share multiple secret images over the internet. Normally, most of the secret image sharing schemes can share only a single secret image. However, due to the rapid development of internet technology, the necessity of sharing multiple images arises. An (nn) MSIS is employed to share n images to n authorized participants. All the n participants are required to submit their respective shares to recover the original secret images. If the number of the participants is less than n, then reconstruction of the secret images is impossible. Most of the existing schemes which are in the frequency domain do not have the capability to handle multiple secret images. In this paper, a MSIS that uses the Discrete Cosine Transform is proposed to overcome the limitation present in the existing schemes. Moreover, the proposed scheme requires less computational time than the existing schemes. Security of the proposed scheme is analyzed and shows that the proposed scheme is computationally secure. Also, the proposed scheme can recover the same original secret images.

Keywords

Secret image sharing scheme Discrete Cosine Transform (DCT) Two-variable one-way function Inverse Discrete Cosine Transform (IDCT) Frequency domain 

Notes

Compliance with ethical standards

Conflict of interest

The authors declare that they have no conflict of interest.

References

  1. 1.
    Li, G.-D., et al.: Double chaotic image encryption algorithm based on optimal sequence solution and fractional transform. Vis. Comput. (2018).  https://doi.org/10.1007/s00371-018-1574-y
  2. 2.
    Chanu, O.B., Neelima, A.: A survey paper on secret image sharing schemes. Int. J. Multimed. Inf. Retr. (2018).  https://doi.org/10.1007/s13735-018-0161-3
  3. 3.
    Cheng, Y.-M., Wang, C.-M.: A high-capacity steganographic approach for 3d polygonal meshes. Vis. Comput. 22(9–11), 845–855 (2006)CrossRefGoogle Scholar
  4. 4.
    Nair, D.G., Binu, V., Kumar, G.S.: An improved e-voting scheme using secret sharing based secure multi-party computation, arXiv preprint arXiv:1502.07469 1–10 (2015)
  5. 5.
    Chang, T.-Y., Hwang, M.-S., Yang, W.-P.: A new multi-stage secret sharing scheme using one-way function. ACM SIGOPS Oper. Syst. Rev. 39(1), 48–55 (2005)CrossRefGoogle Scholar
  6. 6.
    Shamir, A.: How to share a secret. Commun. ACM 12(11), 612–613 (1979)MathSciNetCrossRefzbMATHGoogle Scholar
  7. 7.
    Blakley, G.R. et al.: Safeguarding cryptographic keys. In: Proceedings of the National Computer Conference, Vol. 48, pp. 313–317 (1979)Google Scholar
  8. 8.
    Thien, C.-C., Lin, J.-C.: Secret image sharing. Comput. Graph. 26(5), 765–770 (2002)CrossRefGoogle Scholar
  9. 9.
    Wu, C.-C., Hwang, M.-S., Kao, S.-J.: A new approach to the secret image sharing with steganography and authentication. Imaging Sci. J. 57(3), 140–151 (2009)CrossRefGoogle Scholar
  10. 10.
    Lin, C.-C., Tsai, W.-H.: Secret image sharing with steganography and authentication. J. Syst. Softw. 73(3), 405–414 (2004)CrossRefGoogle Scholar
  11. 11.
    Wang, R.-Z., Shyu, S.-J.: Scalable secret image sharing. Signal Process. Image Commun. 22(4), 363–373 (2007)CrossRefGoogle Scholar
  12. 12.
    Eslami, Z., Razzaghi, S., Ahmadabadi, J.Z.: Secret image sharing based on cellular automata and steganography. Pattern Recognit. 43(1), 397–404 (2010)CrossRefzbMATHGoogle Scholar
  13. 13.
    Yang, C.-N., Ouyang, J.-F., Harn, L.: Steganography and authentication in image sharing without parity bits. Opt. Commun. 285(7), 1725–1735 (2012)CrossRefGoogle Scholar
  14. 14.
    Singh, A., Jauhari, U.: A symmetric steganography with secret sharing and PSNR analysis for image steganography. Int. J. Sci. Eng. Res. 3(6), 2–8 (2012)Google Scholar
  15. 15.
    Girdhar, A., Kaur, A.: Secret image sharing scheme with steganography and authentication based on discrete wavelet transform. In: International Conference on Innovations in Engineering and Technology, pp. 58–61 (2013)Google Scholar
  16. 16.
    Yang, C.-N., Ciou, C.-B.: Image secret sharing method with two-decoding-options: lossless recovery and previewing capability. Image Vis. Comput. 28(12), 1600–1610 (2010)CrossRefGoogle Scholar
  17. 17.
    Fang, T.-P.: Safe secret image sharing with fault tolerance key. IJCSNS Int. J. Comput. Sci. Netw. Secur. 11(9), 20–23 (2011)Google Scholar
  18. 18.
    Fang, W.-P., Lin, J.-C.: Multi-channel secret image transmission with fast decoding: by using bit-level sharing and economic-size shares. Int. J. Comput. Netw. Secur. 6, 228–234 (2006)Google Scholar
  19. 19.
    Chen, C.-C., Liu, C.-A.L.: Tamper-proof secret image-sharing scheme for identifying cheated secret keys and shared images. J. Electron. Imaging 22(1), 013008 (2013)CrossRefGoogle Scholar
  20. 20.
    Guo, C., Chang, C.-C., Qin, C.: A novel (n, t, n) secret image sharing scheme without a trusted third party. Multimed. Tools Appl. 72(3), 2195–2209 (2014)CrossRefGoogle Scholar
  21. 21.
    Yang, C.-N., Li, P., Wu, C.-C., Cai, S.-R.: Reducing shadow size in essential secret image sharing by conjunctive hierarchical approach. Signal Process. Image Commun. 31, 1–9 (2015)CrossRefGoogle Scholar
  22. 22.
    Koga, H., Ueda, E.: Basic properties of the (t, n)-threshold visual secret sharing scheme with perfect reconstruction of black pixels. Des. Codes Cryptogr. 40(1), 81–102 (2006)MathSciNetCrossRefzbMATHGoogle Scholar
  23. 23.
    Surekha, B., Swamy, G.: Visual secret sharing based digital image watermarking. Int. J. Comput. Sci. Issues (IJCSI) 9(3), 312–317 (2012)Google Scholar
  24. 24.
    Adachi, T., Okazaki, C.: A multi-secret sharing scheme with many keys based on hermite interpolation. J. Appl. Math. Phys. 2(13), 1196 (2014)CrossRefGoogle Scholar
  25. 25.
    Chen, T.-H., Wu, C.-S.: Efficient multi-secret image sharing based on boolean operations. Signal Process. 91(1), 90–97 (2011)CrossRefzbMATHGoogle Scholar
  26. 26.
    Chen, C.-C., Wu, W.-J.: A secure boolean-based multi-secret image sharing scheme. J. Syst. Softw. 92, 107–114 (2014)CrossRefGoogle Scholar
  27. 27.
    Yang, C.-N., Chen, C.-H., Cai, S.-R.: Enhanced boolean-based multi secret image sharing scheme. J. Syst. Softw. 116, 22–34 (2016)CrossRefGoogle Scholar
  28. 28.
    Rajput, M., Deshmukh, M.: Secure (n, n+ 1)-multi secret image sharing scheme using additive modulo. Proc. Comput. Sci. 89, 677–683 (2016)CrossRefGoogle Scholar
  29. 29.
    Xie, D., Li, L., Peng, H., Yang, Y.: A secure and efficient scalable secret image sharing scheme with flexible shadow sizes. PLoS ONE 12(1), e0168674 (2017)CrossRefGoogle Scholar
  30. 30.
    Singh, P., Raman, B., Misra, M.: A secure image sharing scheme based on svd and fractional fourier transform. Signal Process. Image Commun. 57, 46–59 (2017)CrossRefGoogle Scholar
  31. 31.
    Bhattacharya, T., Dey, N., Chaudhuri, S.: A session based multiple image hiding technique using DWT and DCT. arXiv preprint arXiv:1208.0950
  32. 32.
    Chanu, O.B., Tentu, A. N., Venkaiah, V. C.: Multi-stage multi-secret sharing schemes based on Chinese remainder theorem. In: Proceedings of the 2015 International Conference on Advanced Research in Computer Science Engineering and Technology (ICARCSET 2015), ACM, p. 17 (2015)Google Scholar
  33. 33.
    Mohamed, F.P., et al.: Hierarchical threshold secret sharing scheme for color images. Multimed. Tools Appl. 76(4), 5489–5503 (2017)CrossRefGoogle Scholar
  34. 34.
    Paillier, P.: On ideal non-perfect secret sharing schemes. In: International Workshop on Security Protocols, Springer, pp. 207–216 (1997)Google Scholar
  35. 35.
    Wang, X., Xiang, C., Fu, F.-W.: Secret sharing schemes for compartmented access structures. Cryptogr. Commun. 9(5), 625–635 (2017)MathSciNetCrossRefzbMATHGoogle Scholar
  36. 36.
    Bhattacharjee, T., Maity, S.P.: An image-in-image communication scheme using secret sharing and M-ary spread spectrum watermarking. Microsyst. Technol. 23(9), 4263–4276 (2017)CrossRefGoogle Scholar
  37. 37.
    Latha, S.B., Reddy, D. V., Damodaram, A.: An image watermarking scheme using threshold based secret sharing. In: Advance Computing Conference (IACC), IEEE 7th International. IEEE, pp. 619–623 (2017)Google Scholar
  38. 38.
    Wu, X., Sun, W.: Secret image sharing scheme with authentication and remedy abilities based on cellular automata and discrete wavelet transform. J. Syst. Softw. 86(4), 1068–1088 (2013)CrossRefGoogle Scholar
  39. 39.
    Ernawan, F., Kabir, M.N.: A block-based RDWT-SVD image watermarking method using human visual system characteristics. Vis. Comput. (2018).  https://doi.org/10.1007/s00371-018-1567-x

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringNIT NagalandChumukedima, DimapurIndia

Personalised recommendations