Skip to main content

K Out of N Secret Sharing Scheme with Steganography and Authentication

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 412))

Abstract

With communication, preservation and processing of information becoming digital, security of such transactions is a matter of prime concern. This has resulted in the development of encryption and cryptography. The degree of security of confidential data is measured by the involvement of one or more people—at times security is guaranteed when a single hand is involved, while at others secrets kept in parts by many ensures security. This has given rise to secret sharing that has emerged as a hot area of research in computer science in the past decade. Existing schemes of secret sharing suffer from pixel expansion and degradation in visual quality of the recovered secret and cover images. This paper aims to develop a steganography and authenticated image sharing (SAIS) scheme for gray and color images with meaningful shares and the authentication ability to detect the manipulation of shadow images. The main features of this scheme is the use of simple Boolean and arithmetic operations and thus the computational complexity is reduced from O(nlog2n) to O(n).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Noar, N., Shamir, A.: Visual Cryptography, Advances In Cryptology: Eurocrypt’94. Springer, Berlin (1995)

    Google Scholar 

  2. Kang, I.K., Arce, G.R., Lee, H.K.: Color extended visual cryptography using error diffusion. IEEE Trans. Image Process. (2011)

    Google Scholar 

  3. Shamir, A.: How to Share a Secret. Commun. ACM 22(11), 612–613 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  4. Blakley, G.R.: Safeguarding cryptographic keys. In: Proceedings of FIPS National Computer Conference, vol. 48, pp. 313–317 (1979)

    Google Scholar 

  5. Chang, C.-C., Lin, P.-Y., Wang, Z.H, Li, M.C.: A sudoku-based secret image sharing scheme with reversibility. J. Commun. 5(1) (2010)

    Google Scholar 

  6. Thien, C.C., Lin, J.C.: Secret image sharing. Comput. Graph. 26, 765 (2002)

    Google Scholar 

  7. Ahmad, T., Studiawan, H., Ahmad, H.S., Ijtihadie, R.M., Wibisono, W.: Shared secret-based Steganography for protecting medical data. In: International Conference on Computer, Control, Informatics and Its Applications, (2014)

    Google Scholar 

  8. Lin, C., Tsai, W.: Secret image sharing with steganography and authentication. J. Syst. Softw. 405–414 (2004)

    Google Scholar 

  9. Yang, C.N., Chen, T.C., Yu, K.H., Wang, C.C.: Improvements of image sharing with steganography and authentication.. J. Syst. Softw. 1070 (2007)

    Google Scholar 

  10. Chang, C., Hsieh, Y., Lin, C.: Sharing secrets in stego images with authentication. Pattern Recogn. 3130–3137 (2008)

    Google Scholar 

  11. Eslami, Z., Razzaghi, S.H., Ahmadabadi, J.Z.: Secret image sharing based on cellular automata and steganography. Pattern Recogn. 43, 397 (2010)

    Google Scholar 

  12. Yang, C.-N., Ouyang, J.-F., Harn, L.: Steganography and authentication in image sharing without parity bits. Opt. Commun. 1725–1735 (2012)

    Google Scholar 

  13. Fathimal, P.M., Rani, P.A.J.: K out of N secret sharing scheme for gray and color images. In: IEEE International Conference on Electrical, Computer and Communication Technologies, March 2015

    Google Scholar 

  14. Fathimal, P.M., Rani, P.A.J.: Bidirectional serpentine scan based error diffusion technique for color image visual cryptography. Int. J. Sci. Eng. Technol. Res. (2014)

    Google Scholar 

  15. Fathimal, P.M., Rani, P.A.J.: (N, N) Secret color image sharing scheme with dynamic group. Int. J. Comput. Netw. Inf. Secur. (2015)

    Google Scholar 

  16. Fathimal, P.M., Rani, P.A.J.: Design of block based visual secret sharing scheme for color images. Int. J. Appl. Eng. Res. (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. Mohamed Fathimal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

Mohamed Fathimal, P., Arockia Jansi Rani, P. (2016). K Out of N Secret Sharing Scheme with Steganography and Authentication. In: Senthilkumar, M., Ramasamy, V., Sheen, S., Veeramani, C., Bonato, A., Batten, L. (eds) Computational Intelligence, Cyber Security and Computational Models. Advances in Intelligent Systems and Computing, vol 412. Springer, Singapore. https://doi.org/10.1007/978-981-10-0251-9_39

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-0251-9_39

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-0250-2

  • Online ISBN: 978-981-10-0251-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics