Preserving the Privacy of Audio File Using Ideal Secret Sharing Scheme with Cloud Storage

  • Meghna Ashoka Mohan
  • T. V. Jayakumar
  • K. Praveen
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1118)


Cloud storages like Google Drive, Firebase and Dropbox can be used for storing huge data owned by the users. Privacy has always been an issue with such technologies. The properties of security—confidentiality, integrity and availability are vital when privacy is concerned. Secret sharing schemes have been widely used for preserving the privacy of the user’s data in the following way. The data can be divided into multiple shares using secret sharing scheme, and each shares can be stored in different cloud storages. This paper puts forward a novel approach of splitting audio files into shares using ideal visual secret sharing scheme which is a lightweight approach instead of number theory-based secret sharing method. In an ideal visual secret sharing scheme, after reconstruction of the secret using secret shares, we will get back the original data without any changes. This method also makes sure that with the help of malwares an attacker cannot retrieve the information of the secret from any of the shares alone which is stored in the cloud.


Visual cryptography Audio security Secret sharing scheme Cloud storage Privacy 


  1. 1.
    Wu, H.L., Chang, C.C.: A robust image encryption scheme based on RSA and secret sharing for cloud storage systems. J. Inf. Hiding Multimedia Sig. Process. 6(2), 288–296 (2015)Google Scholar
  2. 2.
    Praveen, K., Indu, G., Santhya, R., Sethumadhavan, M.: An Android Application for secret image sharing with cloud storage. Security in Computing and Communications. SSCC, : Communications in Computer and Information Science, vol. 746, p. 2017. Springer, Singapore (2017)Google Scholar
  3. 3.
    Morozan, I.: A New Model to Provide Security in Cloud Computing. Vrije UniversiteitGoogle Scholar
  4. 4.
    Naor M., Shamir A.: Visual cryptography. In: De Santis, A. (eds.) Advances in Cryptology – EUROCRYPT’94. EUROCRYPT 1994. Lecture Notes in Computer Science, vol. 950. Springer, Berlin, Heidelberg (1995)Google Scholar
  5. 5.
    Blakley, R.G., Kabatiansky, G.A.: Generalized ideal secret-sharing schemes and matroids. Probl. Peredachi Inf. 33(3), 102–110 (1997); Problems Inform. Transmission, 33(3), 277–284 (1997)Google Scholar
  6. 6.
    Desmedt Y., Hou S., Quisquater J.J. Audio and Optical Cryptography. In: Ohta K., Pei D. (eds.) Advances in Cryptology – ASIACRYPT’98. ASIACRYPT 1998. Lecture Notes in Computer Science, vol. 1514. Springer, Berlin, Heidelberg (1998)Google Scholar
  7. 7.
    Yakubu, M.A., Maddage, N.C., Atrey P.K.: Audio Secret Management Scheme Using Shamir’s Secret Sharing. In: He, X., Luo, S., Tao, D., Xu, C., Yang, J., Hasan, M.A. (eds.) MultiMedia Modeling. MMM 2015. Lecture Notes in Computer Science, vol. 8935. Springer, Cham (2015)Google Scholar
  8. 8.
    Yang, Ching-N: Improvements on audio and optical cryptography. J. Inf. Sci. Eng. 18(3), 381–391 (2002)Google Scholar
  9. 9.
    Lin, C.-C., Laih, C.-S., Yang, C.-N.: New audio secret sharing schemes with time division technique. J. Inf. Sci. Eng. 19, 605–614 (2003)Google Scholar
  10. 10.
    Ehdaie, M., Eghlidos, T., Aref, M.R.: A novel secret sharing scheme from audio perspective. In: 2008 International Symposium on Telecommunications, pp. 13–18 (2008)Google Scholar
  11. 11.
    Socek, D., Magliveras, S.: General access structures in audio cryptography, 6,6. (2005)
  12. 12.
    Wang, J.-Z., Wu, T.-X., Sun, T.-Y.: An audio secret sharing system based on fractal encoding 211–216. (2015).
  13. 13.
    Vyavahare, S., Patil, S.: Analysing Secret Sharing Schemes for Audio Sharing. International Journal of Computer Applications 137(11):39-42, March 2016. Published by Foundation of Computer Science (FCS), NY, USAGoogle Scholar
  14. 14.
    Fujita, N., Nishimura, R., Suzuki, Y.: Audio secret sharing for 1-bit audio (2006)Google Scholar
  15. 15.
    Bharti, S.S., Gupta, M. Agarwal, S.: Multimed Tools Appl 77, 25629 (2018)Google Scholar
  16. 16.
    Naor, M., Shamir, A.: Visual cryptography. In: De Santis A. (eds) Advances in Cryptology – EUROCRYPT’94. EUROCRYPT 1994. Lecture Notes in Computer Science, vol. 950. Springer, Berlin, Heidelberg (1995)Google Scholar
  17. 17.
    Ciptasari, R.W., Rhee, K.H., Sakurai, K.: EURASIP J. on Info. Security 2014, 2 (2014)Google Scholar
  18. 18.
    Stelvio Cimato, A.L.F., De Santis, A., Masucci, B.: Ideal contrast visual cryptography schemes with reversing. J. Comput. Syst. Sci. (1993)Google Scholar
  19. 19.
    Praveen, K., Sethumadhavan, M.: Ideal contrast visual cryptography for general access structures with and operation. In: Nagar, A., Mohapatra, D., Chaki, N. (eds.) LNCS, vol. 44. Springer, New Delhi (2016)Google Scholar
  20. 20.
    Tuyls, P., Hollmann, H.D.L., Lint, J.H.V., et al.: Des codes crypt 37, 169 (2005)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Meghna Ashoka Mohan
    • 1
  • T. V. Jayakumar
    • 1
  • K. Praveen
    • 1
  1. 1.TIFAC-CORE in Cyber SecurityAmrita School of Engineering, Amrita Vishwa VidyapeethamCoimbatoreIndia

Personalised recommendations