Enhanced Secret Image Sharing Using POB Number System

  • Yan-Xiao LiuEmail author
  • Ching-Nung Yang
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 895)


In 2017, Singh et al. constructed a secure cloud-based (2, 2) secret image sharing with the capability of tampering detection using (rn) Permutation Ordered Binary (POB) number system. This scheme can solve the problem of secure storage of image-shares at cloud servers, and is also capable of authenticating image-shares at pixel level. However, Singh et al.’s scheme assumes that participants already know the parameters r in (rn) POB, on which they can recover each image pixel efficiently. In fact, the distribution of parameters r is not that easy as described in their scheme, it needs secure channels and the storage of r is almost same as the share. In Singh et al.’s scheme, the authors did not show how to share the information of r among participants. In this paper, we proposed a new secret image sharing using (rn) POB number system which is extended from Singh et al.’s framework. In our scheme, the parameters r for all image pixels are identical and are publicly published. Thus, the problem of Singh et al.’s scheme is solved. In addition, our scheme can also authenticate tampered shares at pixel level.


Image secret sharing Permutation Ordered Binary (POB) Authentication 



This work was supported by National Natural Science Foundation of China under Grant No. 61502384, and in part by Ministry of Science and Technology (MOST), under Grant 107-2221-E-259-007.


  1. 1.
    Thien, C.C., Lin, J.C.: Secret image sharing. Comput. Graph. 26, 765–770 (2002)CrossRefGoogle Scholar
  2. 2.
    Yang, C.N., Chu, Y.Y.: A general \((k, n)\) scalable secret image sharing scheme with the smooth scalability. J. Syst. Softw. 84(10), 1726–1733 (2011)CrossRefGoogle Scholar
  3. 3.
    Liu, Y.X., Yang, C.N.: Scalable secret image sharing scheme with essential shadows. Sig. Process. Image Commun. 58, 49–55 (2017)CrossRefGoogle Scholar
  4. 4.
    Wang, R.Z.: Region incrementing visual cryptography. IEEE Signal Process. Lett. 16(8), 659–662 (2009)CrossRefGoogle Scholar
  5. 5.
    Yang, C.N., Shih, H.W., Wu, C.C., Harn, L.: \(k\) out of \(n\) region incrementing scheme in visual cryptography. IEEE Trans. Circuits Syst. Video Technol. 22(5), 799–809 (2012)CrossRefGoogle Scholar
  6. 6.
    Yang, C.N., Chen, T.S.: Extended visual secret sharing schemes: improving the shadow image quality. Int. J. Pattern Recognit. Artif. Intell. 21, 879–898 (2007)CrossRefGoogle Scholar
  7. 7.
    Chen, T.H., Wu, C.S.: Efficient multi-secret image sharing based on Boolean-operations. Sig. Process. 91(1), 90–97 (2011)CrossRefGoogle Scholar
  8. 8.
    Liu, Y.X., Yang, C.N., Wu, S.Y., Chou, Y.S.: Progressive \((k, n)\) secret image sharing schemes based on Boolean operations and covering codes. Sig. Process. Image Commun. 66, 77–86 (2018)CrossRefGoogle Scholar
  9. 9.
    Liu, Y.X., Yang, C.N., Chou, Y.S., Wu, S.Y., Sun, Q.D.: Progressive \((k, n)\) secret image sharing scheme with meaningful shadow images by GEMD and RGEMD. J. Vis. Commun. Image Represent. 55, 766–777 (2018)CrossRefGoogle Scholar
  10. 10.
    Sreekumar, A., Sundar, S.B.: An efficient secret sharing scheme for \(n\) out of \(n\) scheme using POB-number system. Int. J. Inf. Process. 3(4), 77–83 (2009)Google Scholar
  11. 11.
    Deepika, M.P., Sreekumar, A.: A novel secret sharing scheme using POB number system and CRT. Int. J. Appl. Eng. Res. 11(3), 2049–2054 (2016)Google Scholar
  12. 12.
    Singh, P., Raman, B., Agarwal, N., Atrey, P.K.: Secure cloud-based image tampering detection and localization using POB number system. ACM Trans. Multimedia Comput. Commun. Appl. 13(3), 1–23 (2017)CrossRefGoogle Scholar
  13. 13.
    Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583–592 (2012)CrossRefGoogle Scholar
  14. 14.
    Kuyoro, S.O., Ibikunle, F., Awodele, O.: Cloud computing security issues and challenges. Int. J. Comput. Netw. 3(5), 445–454 (2011)Google Scholar
  15. 15.
    Mohamed, H., Kianoosh, M.: Authentication schemes for multimedia streams: quantitative analysis and comparison. ACM Trans. Multimedia Comput. Commun. Appl. 6(1), 1–24 (2010)Google Scholar
  16. 16.
    Sanjay, R., Balasubramanian, R.: A chaotic system based fragile watermarking scheme for image tamper detection. AEU Int. J. Electron. Commun. 65(10), 840–847 (2011)CrossRefGoogle Scholar
  17. 17.
    Bhatnagar, G., Wu, Q.M.J., Atrey, P.K.: Secure randomized image watermarking based on singular value decomposition. ACM Trans. Multimedia Comput. Commun. Appl. 10(1), 1–21 (2013)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Xi’an University of TechnologyXi’anChina
  2. 2.National Dong Hwa UniversityHualien CountyTaiwan

Personalised recommendations