Skip to main content
Top

2017 | OriginalPaper | Chapter

A Novel Visual Secret Sharing Scheme Using Affine Cipher and Image Interleaving

Authors : Harkeerat Kaur, Aparajita Ojha

Published in: Proceedings of International Conference on Computer Vision and Image Processing

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Recently an interesting image sharing method for gray level images using Hill Cipher and RG-method has been introduced by Chen [1]. The method does not involve pixel expansion and image recovery is lossless. However, use of Hill Cipher requires a \(2\times 2\) integer matrix whose inverse should also be an integer matrix. Further, to extend the method for multi-secret sharing, one requires higher order integer matrices. This needs heavy computation and the choice of matrices is also very restricted, due to integer entry constraints. In the present paper we introduce an RG-based Visual Secret Sharing Scheme (VSS) scheme using image interleaving and affine cipher. Combined effect of image interleaving and affine transformation helps in improving the security of the secret images. Parameters of the affine cipher serve as keys and the random grid and encrypted image form the shares. No one can reveal the secret unless the keys and both the shares are known. Further, as opposed to the method in [1], the present scheme does not require invertible matrix with integer inverse. The scheme is also extended for multi-secret sharing.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Chen, W.K.: Image sharing method for gray-level images. Journal of Systems and Software 86 (2013) 581–585CrossRef Chen, W.K.: Image sharing method for gray-level images. Journal of Systems and Software 86 (2013) 581–585CrossRef
2.
go back to reference Naor, M., Shamir, A.: Visual cryptography. In: Advances in Cryptology EUROCRYPT’94, Springer (1995) 1–12 Naor, M., Shamir, A.: Visual cryptography. In: Advances in Cryptology EUROCRYPT’94, Springer (1995) 1–12
3.
go back to reference Kafri, O., Keren, E.: Encryption of pictures and shapes by random grids. Optics letters 12 (1987) 377–379CrossRef Kafri, O., Keren, E.: Encryption of pictures and shapes by random grids. Optics letters 12 (1987) 377–379CrossRef
4.
go back to reference Shyu, S.J.: Image encryption by multiple random grids. Pattern Recognition 42 (2009) 1582–1596CrossRefMATH Shyu, S.J.: Image encryption by multiple random grids. Pattern Recognition 42 (2009) 1582–1596CrossRefMATH
5.
go back to reference Chen, T.H., Tsao, K.H.: Threshold visual secret sharing by random grids. Journal of Systems and Software 84 (2011) 1197–1208CrossRef Chen, T.H., Tsao, K.H.: Threshold visual secret sharing by random grids. Journal of Systems and Software 84 (2011) 1197–1208CrossRef
6.
go back to reference Guo, T., Liu, F., Wu, C.: k out of k extended visual cryptography scheme by random grids. Signal Processing 94 (2014) 90–101CrossRef Guo, T., Liu, F., Wu, C.: k out of k extended visual cryptography scheme by random grids. Signal Processing 94 (2014) 90–101CrossRef
7.
go back to reference Wu, X., Sun, W.: Improved tagged visual cryptography by random grids. Signal Processing 97 (2014) 64–82CrossRef Wu, X., Sun, W.: Improved tagged visual cryptography by random grids. Signal Processing 97 (2014) 64–82CrossRef
8.
go back to reference William, S., Stallings, W.: Cryptography and Network Security, 4/E. Pearson Education India (2006) William, S., Stallings, W.: Cryptography and Network Security, 4/E. Pearson Education India (2006)
9.
go back to reference De Palma, P., Frank, C., Gladfelter, S., Holden, J.: Cryptography and computer security for undergraduates. In: ACM SIGCSE Bulletin. Volume 36., ACM (2004) 94–95 De Palma, P., Frank, C., Gladfelter, S., Holden, J.: Cryptography and computer security for undergraduates. In: ACM SIGCSE Bulletin. Volume 36., ACM (2004) 94–95
10.
go back to reference Shyu, S.J., Huang, S.Y., Lee, Y.K., Wang, R.Z., Chen, K.: Sharing multiple secrets in visual cryptography. Pattern Recognition 40 (2007) 3633–3651CrossRefMATH Shyu, S.J., Huang, S.Y., Lee, Y.K., Wang, R.Z., Chen, K.: Sharing multiple secrets in visual cryptography. Pattern Recognition 40 (2007) 3633–3651CrossRefMATH
11.
go back to reference Chen, L., Wu, C.: A study on visual cryptography. Diss. Master Thesis, National Chiao Tung University, Taiwan, ROC (1998) Chen, L., Wu, C.: A study on visual cryptography. Diss. Master Thesis, National Chiao Tung University, Taiwan, ROC (1998)
12.
go back to reference Feng, J.B., Wu, H.C., Tsai, C.S., Chang, Y.F., Chu, Y.P.: Visual secret sharing for multiple secrets. Pattern Recognition 41 (2008) 3572–3581CrossRefMATH Feng, J.B., Wu, H.C., Tsai, C.S., Chang, Y.F., Chu, Y.P.: Visual secret sharing for multiple secrets. Pattern Recognition 41 (2008) 3572–3581CrossRefMATH
13.
go back to reference Hsu, H.C., Chen, T.S., Lin, Y.H.: The ringed shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharing. In: Networking, Sensing and Control, 2004 IEEE International Conference on. Volume 2., IEEE (2004) 996–1001 Hsu, H.C., Chen, T.S., Lin, Y.H.: The ringed shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharing. In: Networking, Sensing and Control, 2004 IEEE International Conference on. Volume 2., IEEE (2004) 996–1001
14.
go back to reference Bunker, S.C., Barasa, M., Ojha, A.: Linear equation based visual secret sharing scheme. In: Advance Computing Conference (IACC), 2014 IEEE International, 2014 IEEE (2014) 406–410 Bunker, S.C., Barasa, M., Ojha, A.: Linear equation based visual secret sharing scheme. In: Advance Computing Conference (IACC), 2014 IEEE International, 2014 IEEE (2014) 406–410
Metadata
Title
A Novel Visual Secret Sharing Scheme Using Affine Cipher and Image Interleaving
Authors
Harkeerat Kaur
Aparajita Ojha
Copyright Year
2017
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-2107-7_7