A framework for counting based secret sharing scheme for images

被引:0
|
作者
Parihar B. [1 ]
Deshmukh M. [1 ]
Rawat A.S. [2 ]
机构
[1] National Institute of Technology, Uttarakhand
[2] National Institute of Technology, Delhi
关键词
Counting based secret sharing; Parallel counting; Reconstructed secret; Secret image; Shares;
D O I
10.1007/s11042-024-19749-w
中图分类号
学科分类号
摘要
The existing secret sharing schemes used to protect sensitive multimedia data in distributed forms often compromise either security or computational overhead. To address this issue, a counting-based secret sharing scheme has been introduced that reduces the complexity of the algorithm with less computational overhead and also provides perfect security. However, existing counting-based secret sharing schemes have not been developed for multimedia data such as images and videos. This paper introduces a framework for a counting-based secret image sharing scheme. The proposed scheme is a perfect (n, n) type, where the first n denotes the number of shares distributed, and the second n signifies the number of shares required to reconstruct the secret image, thus providing perfect security. Here, ‘counting’ refers to counting the number of bits’ occurrences. The proposed approach is divided into two processes: share generation and secret reconstruction. In the share generation process, lightweight horizontal bit counting combined with bitwise additive modulo operations are used to generate the n randomized shares from one secret image and n-1 arbitrary images. The arbitrary images increase the randomness in the shares, which enhances security. In the secret reconstruction process, all n shares are required to recover the secret, demonstrating the scheme’s perfect secrecy. The secret reconstruction process utilizes lightweight horizontal bit counting. Both the share generation and secret reconstruction processes employ lightweight horizontal bit counting and bitwise additive modulo operations to reduce the overall computational overhead. The approach has been tested on both grayscale and colored images, each with a resolution of 512×512 pixels, demonstrating its adaptability to various types of multimedia images. Its effectiveness has been validated through rigorous statistical analysis, including tests for correlation, RMSE, PSNR, SSIM, NPCR, and UACI, all of which indicate superior performance compared to existing schemes. Histogram analysis of the shares further confirms their high randomization and the secure non-disclosure of secret information. The comparison of parameters with existing work shows that our approach outperforms them. However, the primary limitation of this scheme is that it is designed to secure only a single secret and does not support multiple secrets. Moreover, the absence of fault tolerance highlights the scheme’s emphasis on perfect secrecy, ensuring that fewer than n shares cannot reconstruct the secret. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.
引用
下载
收藏
页码:86757 / 86790
页数:33
相关论文
共 50 条
  • [21] Verifiable XOR-based visual secret sharing scheme for hyperspectral images
    Srujana, Oruganti Sai
    Mhala, Nikhil C.
    Pais, Alwyn R.
    JOURNAL OF APPLIED REMOTE SENSING, 2021, 15 (01)
  • [22] A Secret Sharing Scheme Based on AES
    Cui, Jie
    Chen, Lei
    Zhang, Yiming
    Xie, Zhiqiang
    Zhong, Hong
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (06): : 295 - 302
  • [23] On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme
    Wang, Daoshun
    Yi, Feng
    EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2010,
  • [24] On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme
    Daoshun Wang
    Feng Yi
    EURASIP Journal on Advances in Signal Processing, 2010
  • [25] A Steganography Framework for Easy Secret Sharing through Images
    Palanisamy, Praveen
    Rajagopal, Manoj Kumar
    2013 IEEE SECOND INTERNATIONAL CONFERENCE ON IMAGE INFORMATION PROCESSING (ICIIP), 2013, : 309 - 312
  • [26] Multi Secret Sharing Scheme for Encrypting Two Secret Images into Two Shares
    Dastanian, Rezvan
    Shahhoseini, Hadi Shahriar
    INFORMATION AND ELECTRONICS ENGINEERING, 2011, 6 : 171 - 175
  • [27] Proactive Secret Sharing Scheme Suitable for Asymmetric Secret Sharing Scheme
    Kaneko, Naoto
    Iwamura, Keiichi
    2016 IEEE 5TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS, 2016,
  • [28] A reversible and authenticable secret sharing scheme using dual images
    Lin, Jiang-Yi
    Horng, Ji-Hwei
    Chang, Chin-Chen
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (13) : 17527 - 17545
  • [29] A new scheme for sharing secret color images in computer network
    Chang, CC
    Tsai, CS
    Chen, TS
    SEVENTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, PROCEEDINGS, 2000, : 21 - 27
  • [30] An analytic construction of the visual secret sharing scheme for color images
    Koga, H
    Iwamoto, M
    Yamamoto, H
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2001, E84A (01) : 262 - 272