Skip to main content
Top
Published in: Wireless Personal Communications 1/2021

18-06-2021

A Novel Security Technique Based on Controlled Pixel Based Encryption of Image Blocks for Sharing a Secret Image

Authors: Neeraj Kumar Rathore, Dhiraj Pandey, Rumi Iqbal Doewes, Abhishek Bhatt

Published in: Wireless Personal Communications | Issue 1/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The existing approaches of block based recovery of progressive secret sharing paradigm have support for limited \({k}\) value in (k, n). Sian et al.’s as well Quan et al.’s block based visual secret sharing scheme has limited bound; works for a limited \({k}\) value of \(\left( {{k},{~n}} \right)\) threshold scheme. A novel threshold based (any value of \({k~and~~n}\)) block recovery in progressive secret sharing has been introduced and analyzed in this paper. Scheme achieves higher value of threshold than the schemes proposed by Sian et al.’s as well Quan et al.’s. The scheme discusses the sharing ability in progressive block based secret sharing up to any general number of thresholds. The contrast of the recovered block wise secret is reasonably good and the scheme allows for perfect security using at least \({k}\) numbers of participants before revealing any of the blocks of secret image. The work in this paper offering a reference point for developing solutions needed in the area of secure image sharing techniques.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Rathore, N., & Chana, I. (2015). Variable threshold-based hierarchical load balancing technique in Grid. Engineering with Computers, 31(3), 597–615.CrossRef Rathore, N., & Chana, I. (2015). Variable threshold-based hierarchical load balancing technique in Grid. Engineering with Computers, 31(3), 597–615.CrossRef
2.
go back to reference Cimato, S., & Yang, C.-N. (2017). Book: Visual cryptography and secret image sharing. CRC Press. ISBN: 9781138076044.CrossRef Cimato, S., & Yang, C.-N. (2017). Book: Visual cryptography and secret image sharing. CRC Press. ISBN: 9781138076044.CrossRef
3.
go back to reference Naor, M., &Shamir, A. (1995). Visual cryptography. In Adv. cryptography, workshop on the theory and application of of cryptographic techniques EUROCRYPT: Advances in cryptology—EUROCRYPT'94 (pp. 1–12). Naor, M., &Shamir, A. (1995). Visual cryptography. In Adv. cryptography, workshop on the theory and application of of cryptographic techniques EUROCRYPT: Advances in cryptology—EUROCRYPT'94 (pp. 1–12).
4.
go back to reference Ito, R., Kuwakado, H., & Tanaka, H. (1999). Image size invariant visual cryptography. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E82-A(10), 2172–2176. Ito, R., Kuwakado, H., & Tanaka, H. (1999). Image size invariant visual cryptography. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E82-A(10), 2172–2176.
5.
go back to reference Yang, C.-N., & Chen, T.-S. (2006). New size-reduced visual secret sharing schemes with half reduction of shadow size. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E89-A(2), 620–625.CrossRef Yang, C.-N., & Chen, T.-S. (2006). New size-reduced visual secret sharing schemes with half reduction of shadow size. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E89-A(2), 620–625.CrossRef
6.
go back to reference Yang, C.-N., & Chen, T.-S. (2006). Visual secret sharing scheme: Improving the contrast of a recovered image via different pixel expansions (pp. 468–479). Springer. Yang, C.-N., & Chen, T.-S. (2006). Visual secret sharing scheme: Improving the contrast of a recovered image via different pixel expansions (pp. 468–479). Springer.
7.
go back to reference Ulutas, M. (2010). Meaningful share generation for increased number of secrets in visual secret-sharing scheme. Mathematical Problems in Engineering, 2010, 1–18.MathSciNetCrossRef Ulutas, M. (2010). Meaningful share generation for increased number of secrets in visual secret-sharing scheme. Mathematical Problems in Engineering, 2010, 1–18.MathSciNetCrossRef
8.
go back to reference Yang, C.-N., & Chen, T.-S. (2005). Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion. Pattern Recognition Letters, 26(2), 193–206.CrossRef Yang, C.-N., & Chen, T.-S. (2005). Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion. Pattern Recognition Letters, 26(2), 193–206.CrossRef
9.
go back to reference Lee, K. H., & Chiu, P. L. (2013). Image size invariant visual cryptography for general access structures subject to display quality constraints. IEEE Transactions on Image Processing, 22(10), 3830–3841.MathSciNetCrossRef Lee, K. H., & Chiu, P. L. (2013). Image size invariant visual cryptography for general access structures subject to display quality constraints. IEEE Transactions on Image Processing, 22(10), 3830–3841.MathSciNetCrossRef
10.
go back to reference Liu, F., Guo, T., Wu, C., & Qian, L. (2012). Improving the visual quality of size invariant visual cryptography scheme. The Journal of Visual Communication and Image Representation, 23(2), 331–342.CrossRef Liu, F., Guo, T., Wu, C., & Qian, L. (2012). Improving the visual quality of size invariant visual cryptography scheme. The Journal of Visual Communication and Image Representation, 23(2), 331–342.CrossRef
13.
go back to reference Nakajima, M., & Yamaguchi, Y. (2002). Extended visual cryptography for natural images. Proceedings of SPIE Journal of WSCG, 10(2), 303–310. Nakajima, M., & Yamaguchi, Y. (2002). Extended visual cryptography for natural images. Proceedings of SPIE Journal of WSCG, 10(2), 303–310.
14.
go back to reference Rawat, S., & Raman, B. (2012). A blind watermarking algorithm based on fractional Fourier transform and visual cryptography. Signal Processing, 92(6), 1480–1491.CrossRef Rawat, S., & Raman, B. (2012). A blind watermarking algorithm based on fractional Fourier transform and visual cryptography. Signal Processing, 92(6), 1480–1491.CrossRef
15.
go back to reference Ross, A., & Othman, A. (2011). Visual cryptography for biometric privacy. IEEE Transactions on Information Forensics and Security, 6(1), 70–81.CrossRef Ross, A., & Othman, A. (2011). Visual cryptography for biometric privacy. IEEE Transactions on Information Forensics and Security, 6(1), 70–81.CrossRef
16.
go back to reference Fang, W.-P. (2008). Friendly progressive visual secret sharing. Pattern Recognition, 41(4), 1410–1414.CrossRef Fang, W.-P. (2008). Friendly progressive visual secret sharing. Pattern Recognition, 41(4), 1410–1414.CrossRef
17.
go back to reference Hou, Y. C., & Quan, Z. Y. (2011). Progressive visual cryptography with unexpanded shares. IEEE Transactions on Circuits and Systems for Video Technology, 21(11), 1760–2176.CrossRef Hou, Y. C., & Quan, Z. Y. (2011). Progressive visual cryptography with unexpanded shares. IEEE Transactions on Circuits and Systems for Video Technology, 21(11), 1760–2176.CrossRef
18.
go back to reference Quan, Z.-Y., Hou, Y.-C., Tsai, C.-F., & Tseng, A.-Y. (2013). Block-based progressive visual secret sharing. Information Science (NY), 233, 290–304.CrossRef Quan, Z.-Y., Hou, Y.-C., Tsai, C.-F., & Tseng, A.-Y. (2013). Block-based progressive visual secret sharing. Information Science (NY), 233, 290–304.CrossRef
19.
go back to reference Weir, J., & Yan, W. (2012). Book: Visual cryptography and its applications. BookBoon. ISBN: 978-8740301267. Weir, J., & Yan, W. (2012). Book: Visual cryptography and its applications. BookBoon. ISBN: 978-8740301267.
20.
go back to reference Conference Handbook. (2012). Asia-Pacific signal and information processing association annual summit and conference: December 3–6, 2012, Hollywood, California, USA, IEEE 2012, ISBN: 978-1-4673-4863-8. Conference Handbook. (2012). Asia-Pacific signal and information processing association annual summit and conference: December 3–6, 2012, Hollywood, California, USA, IEEE 2012, ISBN: 978-1-4673-4863-8.
21.
go back to reference Yang, C.-N., Wang, C.-C., & Chen, T.-S. (2006). Real perfect contrast visual secret sharing schemes with reversing. In ACNS 2006. Springer LNCS (vol. 3989, pp. 433–447). Springer. Yang, C.-N., Wang, C.-C., & Chen, T.-S. (2006). Real perfect contrast visual secret sharing schemes with reversing. In ACNS 2006. Springer LNCS (vol. 3989, pp. 433–447). Springer.
22.
go back to reference Pandey, D., Rawat, U. S., & Kumar, A. (2016). Robust progressive block based visual cryptography with chaotic map. Journal of Discrete Mathematical Sciences and Cryptography, 19(5–6), 1025–1040.MathSciNetCrossRef Pandey, D., Rawat, U. S., & Kumar, A. (2016). Robust progressive block based visual cryptography with chaotic map. Journal of Discrete Mathematical Sciences and Cryptography, 19(5–6), 1025–1040.MathSciNetCrossRef
23.
go back to reference Rathore, N., & Chana, I. (2014). Load balancing and job migration techniques in grid: A survey of recent trends. Wireless Personal Communications, 79(3), 2089–2125.CrossRef Rathore, N., & Chana, I. (2014). Load balancing and job migration techniques in grid: A survey of recent trends. Wireless Personal Communications, 79(3), 2089–2125.CrossRef
24.
go back to reference Sharma, V., Kumar, R., & Rathore, N. K. (2015). Topological broadcasting using parameter sensitivity based logical proximity graphs in coordinated ground-flying ad hoc networks. Journal of Wireless Mobile Networks Ubiquitous Computing and Dependable Applications (JoWUA) SCOPUS Indexed, 6(3), 54–72. Sharma, V., Kumar, R., & Rathore, N. K. (2015). Topological broadcasting using parameter sensitivity based logical proximity graphs in coordinated ground-flying ad hoc networks. Journal of Wireless Mobile Networks Ubiquitous Computing and Dependable Applications (JoWUA) SCOPUS Indexed, 6(3), 54–72.
25.
go back to reference Rathore, N. K., & Chana, I. (2011). A cognitative analysis of load balancing technique with job migration in grid environment. In World congress on information and communication technology (WICT), Mumbai, IEEE proceedings paper (pp. 77–82). ISBN: 978-1-4673-0127-5. Rathore, N. K., & Chana, I. (2011). A cognitative analysis of load balancing technique with job migration in grid environment. In World congress on information and communication technology (WICT), Mumbai, IEEE proceedings paper (pp. 77–82). ISBN: 978-1-4673-0127-5.
26.
go back to reference Rathore, N. K., & Chana, I. (2013). A sender initiate based hierarchical load balancing technique for grid using variable threshold value. In International conference IEEE-ISPC (pp. 1–6, 26–28). ISBN: 978-1-4673-6188-0. Rathore, N. K., & Chana, I. (2013). A sender initiate based hierarchical load balancing technique for grid using variable threshold value. In International conference IEEE-ISPC (pp. 1–6, 26–28). ISBN: 978-1-4673-6188-0.
27.
go back to reference Rathore, N., & Chana, I. (2014). Job migration with fault tolerance based QoS scheduling using hash table functionality in social grid computing. Journal of Intelligent & Fuzzy Systems, 27(6), 2821–2833.CrossRef Rathore, N., & Chana, I. (2014). Job migration with fault tolerance based QoS scheduling using hash table functionality in social grid computing. Journal of Intelligent & Fuzzy Systems, 27(6), 2821–2833.CrossRef
28.
go back to reference Rathore, N., & Chana, I. (2016). Job migration policies for grid environment. In Wireless personal communication (vol. 89, no. 1, pp. 241–269, IF-0.979). Springer. Rathore, N., & Chana, I. (2016). Job migration policies for grid environment. In Wireless personal communication (vol. 89, no. 1, pp. 241–269, IF-0.979). Springer.
29.
go back to reference Rathore, N. K., & Chana, I. (2013). Report on hierarchal load balancing technique in grid environment. Journal on Information Technology (JIT), 2(4), 21–35. ISSN Print 2277–5110. Rathore, N. K., & Chana, I. (2013). Report on hierarchal load balancing technique in grid environment. Journal on Information Technology (JIT), 2(4), 21–35. ISSN Print 2277–5110.
30.
go back to reference Rathore, N. K., & Chana, I. (2009). Checkpointing algorithm in Alchemi.NET. In Annual conference of Vijnana Parishad of India and national symposium recent development in applied mathematics & information technology, JUET, Guna, M.P. Rathore, N. K., & Chana, I. (2009). Checkpointing algorithm in Alchemi.NET. In Annual conference of Vijnana Parishad of India and national symposium recent development in applied mathematics & information technology, JUET, Guna, M.P.
31.
go back to reference Rathore, N. (2016). Dynamic threshold based load balancing algorithms. Wireless Personal Communication, 91(1), 151–185.CrossRef Rathore, N. (2016). Dynamic threshold based load balancing algorithms. Wireless Personal Communication, 91(1), 151–185.CrossRef
32.
go back to reference Rathore, N. K., & Chana, I. (2008). Comparative analysis of checkpointing. In PIMR Third National IT conference, IT enabled practices and emerging management paradigm book and category is communication technologies and security issues (pp. 32–35). Topic No/Name-46, Prestige Management and Research, Indore, (MP), India. Rathore, N. K., & Chana, I. (2008). Comparative analysis of checkpointing. In PIMR Third National IT conference, IT enabled practices and emerging management paradigm book and category is communication technologies and security issues (pp. 32–35). Topic No/Name-46, Prestige Management and Research, Indore, (MP), India.
33.
go back to reference Rathore, N. K. (2015). Efficient agent based priority scheduling and load balancing using fuzzy logic in grid computing. Journal on Computer Science (JCOM), 3(3), 11–22. Rathore, N. K. (2015). Efficient agent based priority scheduling and load balancing using fuzzy logic in grid computing. Journal on Computer Science (JCOM), 3(3), 11–22.
34.
go back to reference Rathore, N. K., & Chana, I. (2010). Fault tolerance algorithm in Alchemi.NET middleware. In National conference on education & research (ConFR10), third CSI national conference of CSI division V, Bhopal chapter, IEEE Bombay, and MPCST Bhopal, organized by JUIT, India. Rathore, N. K., & Chana, I. (2010). Fault tolerance algorithm in Alchemi.NET middleware. In National conference on education & research (ConFR10), third CSI national conference of CSI division V, Bhopal chapter, IEEE Bombay, and MPCST Bhopal, organized by JUIT, India.
35.
go back to reference Rathore, N. (2018). Performance of hybrid load balancing algorithm in distributed web server system. Wireless Personal Communication, 101(4), 1233–1246.CrossRef Rathore, N. (2018). Performance of hybrid load balancing algorithm in distributed web server system. Wireless Personal Communication, 101(4), 1233–1246.CrossRef
36.
go back to reference Rathore, N. K. (2016). Ethical hacking & security against cyber crime. Journal on Information Technology (JIT), 5(1), 7–11. Rathore, N. K. (2016). Ethical hacking & security against cyber crime. Journal on Information Technology (JIT), 5(1), 7–11.
37.
go back to reference Rathore, N., & Sharma, A. (2015). Efficient dynamic distributed load balancing technique. Lambert Academic Publication House. Project ID: 127478, ISBN: 978-3-659-78288-6. Rathore, N., & Sharma, A. (2015). Efficient dynamic distributed load balancing technique. Lambert Academic Publication House. Project ID: 127478, ISBN: 978-3-659-78288-6.
38.
go back to reference Rathore, N. K. (2014). Efficient hierarchical load balancing technique based on grid. In 29th M.P. young scientist congress, Bhopal, M.P. (p. 55). Rathore, N. K. (2014). Efficient hierarchical load balancing technique based on grid. In 29th M.P. young scientist congress, Bhopal, M.P. (p. 55).
39.
go back to reference Rathore, N. K. (2016). Faults in grid. International Journal of Software and Computer Science Engineering, 1(1), 1–19. Rathore, N. K. (2016). Faults in grid. International Journal of Software and Computer Science Engineering, 1(1), 1–19.
40.
go back to reference Rathore, N. K. (2015). Map reduce architecture for grid. Journal on Software Engineering (JSE), 10(1), 21–30.MathSciNet Rathore, N. K. (2015). Map reduce architecture for grid. Journal on Software Engineering (JSE), 10(1), 21–30.MathSciNet
41.
go back to reference Rathore, N. K. (2015). Efficient load balancing algorithm in grid. In 30th M.P. young scientist congress, Bhopal, M.P. (p. 56). Rathore, N. K. (2015). Efficient load balancing algorithm in grid. In 30th M.P. young scientist congress, Bhopal, M.P. (p. 56).
42.
go back to reference Jain, N., Rathore, N., & Mishra, A. (2018). An efficient image forgery detection using biorthogonal wavelet transform and improved relevance vector machine. Wireless Personal Communication, 101(4), 1983–2008.CrossRef Jain, N., Rathore, N., & Mishra, A. (2018). An efficient image forgery detection using biorthogonal wavelet transform and improved relevance vector machine. Wireless Personal Communication, 101(4), 1983–2008.CrossRef
Metadata
Title
A Novel Security Technique Based on Controlled Pixel Based Encryption of Image Blocks for Sharing a Secret Image
Authors
Neeraj Kumar Rathore
Dhiraj Pandey
Rumi Iqbal Doewes
Abhishek Bhatt
Publication date
18-06-2021
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 1/2021
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-021-08630-w

Other articles of this Issue 1/2021

Wireless Personal Communications 1/2021 Go to the issue