Advertisement

Multimedia Tools and Applications

, Volume 73, Issue 3, pp 1459–1486 | Cite as

Collective control over sensitive video data using secret sharing

  • Pradeep K. Atrey
  • Saeed Alharthi
  • M. Anwar Hossain
  • Abdullah AlGhamdi
  • Abdulmotaleb El Saadik
Article

Abstract

Today digital video is used extensively in many applications. Sometimes a video could be treated as a top secret for an organization, for example military secrets, surveillance footage and corporate product designs, and may need to be shared among a group of people in a secure manner. Traditional data security methods such as encryption techniques are prone to single-point attack, i.e. the secret can be revealed by obtaining the decryption key from any single person. Alternatively, the secret sharing scheme provides collective control over the secrecy of information and is considered information theoretically secure. In this paper, we propose to adopt a secret sharing based approach to provide collective control over a given sensitive video. We present three methods that utilize the spatial and temporal redundancy in videos in different ways. We analyze the security of these methods and compare them for efficiency in terms of computation time and space using extensive experimentation.

Keywords

Digital video Secret sharing Security 

Notes

Acknowledgements

Authors would like to thank their colleagues, Majid Khabbazian from University of Alberta and Manoranjan Mohanty from National University of Singapore, for their help in security analysis of the proposed methods. This research is supported by National Plan for Science and Technology (NPST) program by King Saud University Project Number 11-INF1830-02.

References

  1. 1.
    Alharthi S, Atrey PK (2010) Further improvements on secret image sharing scheme. In: MiFor’10: Proc. of the ACM multimedia workshop on multimedia in forensics, security and intelligence. Firenze, Italy, pp 53–58Google Scholar
  2. 2.
    Alharthi S, Atrey PK, Kankanhalli MS (2010) Secret video sharing. In: Proc. of the APSIPA annual summit and conference 2010 (APSIPA-ASC 2010). SingaporeGoogle Scholar
  3. 3.
    Atrey PK, Hildebrand K, Ramanna S (2011) An efficient method for protection of text documents using secret sharing. In: Proc. of the international conference on frontiers of computer science. Bangalore, IndiaGoogle Scholar
  4. 4.
    Bai L (2006) A reliable (k, n) image secret sharing scheme. In: Proc. of the 2nd IEEE international symposium on dependable, autonomic and secure computing, DASC ’06. Indianapolis, USA, pp 31–36Google Scholar
  5. 5.
    Cramer R, Damgrd I, Maurer U (2000) General secure multi-party computation from any linear secret-sharing scheme. In: LNCS Advances in Cryptology—EUROCRYPT. Springer-Verlag, pp 316–334Google Scholar
  6. 6.
    Eskicioglu AM, Delp EJ (2002) An integrated approach to encrypting scalable video. In: Proc. of the IEEE international conference on multimedia and expo. Lausanne, Switzerland, pp 573–576Google Scholar
  7. 7.
    Eskicioglu AM, Dexter S, Delp EJ (2003) Protection of multicast scalable video by secret sharing: simulation results. In: Proc. of the royal society of London, pp 197–204Google Scholar
  8. 8.
    Feldman J, Malkin T, Servedio RA, Stein C (2004) Secure network coding via filtered secret sharingGoogle Scholar
  9. 9.
    Guo H, Georganas ND (2003) A novel approach to digital image watermarking based on a generalized secret sharing scheme. Multimedia Systems 9(3):249–260CrossRefGoogle Scholar
  10. 10.
    Kezia H, Sudha GF (2008) Encryption of digital video based on lorenz chaotic system. In: Proc. of the 16th international conference on advanced computing and communications. Chennai, India, pp 40–45Google Scholar
  11. 11.
    Krawczyk H (1994) Secret sharing made short. In: Proc. of the 13th annual international cryptology conference on advances in cryptology, CRYPTO ’93. London, pp 136–146Google Scholar
  12. 12.
    Li S, Zheng X, Mou X, Cai Y (2002) Chaotic encryption scheme for real-time digital video video. In: Proc. of SPIE electronic imaging—real-time imaging VI, vol 4666. San Jose, pp 149–160Google Scholar
  13. 13.
    Lin CC, Tsai WH (2003) A new approach to video sharing with steganographics effects. In: Proc. of the conference on computer vision, graphics and image processing, CVGIP’03Google Scholar
  14. 14.
    Liu F, Koenig H (2010) A survey of video encryption algorithms. Elsevier Journal of Computers and Security 29(1):3–15CrossRefGoogle Scholar
  15. 15.
    Liu F, Wu CK, Lin XJ (2008) Colour visual cryptography schemes. IET Inf Secur 2:151–165CrossRefMathSciNetGoogle Scholar
  16. 16.
    Lukac R, Plataniotis K (2004) Document image secret sharing using bit-level processing. In: ICIP’04: Proc. of IEEE international conference on image processing. Singapore, pp 2893–2896Google Scholar
  17. 17.
    Ma C, Cheng R (2008) Information security and cryptology. chap. Key Management Based on Hierarchical Secret Sharing in Ad-Hoc Networks. Springer-Verlag, pp 182–191Google Scholar
  18. 18.
    Mink A, Tang X, Ma L, Nakassis T, Hershman B (2006) High speed quantum key distribution system supports one-time pad encryption of real-time video. In: Proc. of SPIE 6244, quantum information and computation IV, 62440M. San Jose, CA, USAGoogle Scholar
  19. 19.
    Naor M, Shamir A (1994) Visual cryptography. In: EUROCRYPT. Perugia, Italy, pp 1–12Google Scholar
  20. 20.
    Raju C, Umadevi G, Srinathan K, Jawahar C (2008) A novel video encryption technique based on secret sharing. In: Proc. of the IEEE international conference on image processing, ICIP ’08. San Diego, California, USA, pp 3136–3139Google Scholar
  21. 21.
    Schoenmakers B (1999) A simple publicly verifiable secret sharing scheme and its application to electronic voting. In: LNCS advances in cryptology—CRYPTO, vol 1666. Springer-Verlag, p 784Google Scholar
  22. 22.
    Shamir A (1979) How to share a secret. Commun ACM 22:612–613CrossRefMATHMathSciNetGoogle Scholar
  23. 23.
    Shyu SJ, Huang SY, Lee YK, Wang RZ, Chen K (2007) Sharing multiple secrets in visual cryptography. Pattern Recogn 40:3633–3651CrossRefMATHGoogle Scholar
  24. 24.
    Simitopoulos D, Zissis N, Georgiadis P, Emmanouilidis V, Strintzis MG (2003) Encryption and watermarking for the secure distribution of copyrighted mpeg video on dvd. Multimedia Systems 9(3):217–227CrossRefGoogle Scholar
  25. 25.
    Stinson DR (1995) Cryptography: theory and practice, 1st edn, Chap 11. CRC Press, Boca RatonMATHGoogle Scholar
  26. 26.
    Takizawa O, Yamamura A (2004) Secret sharing scheme using natural language text. Transactions of Information Processing Society of Japan 45:320–323Google Scholar
  27. 27.
    Thien CC, Lin JC (2002) Secret image sharing. Comput Graph 26(5):765–770CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  • Pradeep K. Atrey
    • 1
  • Saeed Alharthi
    • 2
  • M. Anwar Hossain
    • 3
  • Abdullah AlGhamdi
    • 3
  • Abdulmotaleb El Saadik
    • 4
  1. 1.Department of Applied Computer ScienceUniversity of WinnipegWinnipegCanada
  2. 2.Department of Computer Science and InformationBranch Badr of Taibah UniversityAl-MadinahSaudi Arabia
  3. 3.College of Computer and Information SciencesKing Saud UniversityRiyadhSaudi Arabia
  4. 4.Multimedia Communications Research LaboratoryUniversity of OttawaOttawaCanada

Personalised recommendations