Abstract
With communication, preservation and processing of information becoming digital, security of such transactions is a matter of prime concern. This has resulted in the development of encryption and cryptography. The degree of security of confidential data is measured by the involvement of one or more people—at times security is guaranteed when a single hand is involved, while at others secrets kept in parts by many ensures security. This has given rise to secret sharing that has emerged as a hot area of research in computer science in the past decade. Existing schemes of secret sharing suffer from pixel expansion and degradation in visual quality of the recovered secret and cover images. This paper aims to develop a steganography and authenticated image sharing (SAIS) scheme for gray and color images with meaningful shares and the authentication ability to detect the manipulation of shadow images. The main features of this scheme is the use of simple Boolean and arithmetic operations and thus the computational complexity is reduced from O(nlog2n) to O(n).
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Noar, N., Shamir, A.: Visual Cryptography, Advances In Cryptology: Eurocrypt’94. Springer, Berlin (1995)
Kang, I.K., Arce, G.R., Lee, H.K.: Color extended visual cryptography using error diffusion. IEEE Trans. Image Process. (2011)
Shamir, A.: How to Share a Secret. Commun. ACM 22(11), 612–613 (1979)
Blakley, G.R.: Safeguarding cryptographic keys. In: Proceedings of FIPS National Computer Conference, vol. 48, pp. 313–317 (1979)
Chang, C.-C., Lin, P.-Y., Wang, Z.H, Li, M.C.: A sudoku-based secret image sharing scheme with reversibility. J. Commun. 5(1) (2010)
Thien, C.C., Lin, J.C.: Secret image sharing. Comput. Graph. 26, 765 (2002)
Ahmad, T., Studiawan, H., Ahmad, H.S., Ijtihadie, R.M., Wibisono, W.: Shared secret-based Steganography for protecting medical data. In: International Conference on Computer, Control, Informatics and Its Applications, (2014)
Lin, C., Tsai, W.: Secret image sharing with steganography and authentication. J. Syst. Softw. 405–414 (2004)
Yang, C.N., Chen, T.C., Yu, K.H., Wang, C.C.: Improvements of image sharing with steganography and authentication.. J. Syst. Softw. 1070 (2007)
Chang, C., Hsieh, Y., Lin, C.: Sharing secrets in stego images with authentication. Pattern Recogn. 3130–3137 (2008)
Eslami, Z., Razzaghi, S.H., Ahmadabadi, J.Z.: Secret image sharing based on cellular automata and steganography. Pattern Recogn. 43, 397 (2010)
Yang, C.-N., Ouyang, J.-F., Harn, L.: Steganography and authentication in image sharing without parity bits. Opt. Commun. 1725–1735 (2012)
Fathimal, P.M., Rani, P.A.J.: K out of N secret sharing scheme for gray and color images. In: IEEE International Conference on Electrical, Computer and Communication Technologies, March 2015
Fathimal, P.M., Rani, P.A.J.: Bidirectional serpentine scan based error diffusion technique for color image visual cryptography. Int. J. Sci. Eng. Technol. Res. (2014)
Fathimal, P.M., Rani, P.A.J.: (N, N) Secret color image sharing scheme with dynamic group. Int. J. Comput. Netw. Inf. Secur. (2015)
Fathimal, P.M., Rani, P.A.J.: Design of block based visual secret sharing scheme for color images. Int. J. Appl. Eng. Res. (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Science+Business Media Singapore
About this paper
Cite this paper
Mohamed Fathimal, P., Arockia Jansi Rani, P. (2016). K Out of N Secret Sharing Scheme with Steganography and Authentication. In: Senthilkumar, M., Ramasamy, V., Sheen, S., Veeramani, C., Bonato, A., Batten, L. (eds) Computational Intelligence, Cyber Security and Computational Models. Advances in Intelligent Systems and Computing, vol 412. Springer, Singapore. https://doi.org/10.1007/978-981-10-0251-9_39
Download citation
DOI: https://doi.org/10.1007/978-981-10-0251-9_39
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-0250-2
Online ISBN: 978-981-10-0251-9
eBook Packages: EngineeringEngineering (R0)