Skip to main content
Top

2016 | OriginalPaper | Chapter

A Time Efficient Secret Image Sharing Scheme for Group Authentication System Without Pixel Expansions

Authors : Samarpita Biswas, Nicole Belinda Dillen, Dipak Kumar Kole, Aruna Chakraborty

Published in: Proceedings of the Second International Conference on Computer and Communication Technologies

Publisher: Springer India

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Information security is of vital importance in today’s internet world. Classified data such as military and government information are constantly transmitted over the internet. Among this, top secret data are images such as maps and surveillance footage. It is thus necessary to secure such visual data against unauthorized access. Visual secret sharing is the process of distributing “shares” of a secret image among a group of individuals. Only when all the shares have been combined, can the original secret image be obtained. In this paper, we have proposed a visual secret sharing scheme, using a simple division algorithm, for group authentication systems. This method has the advantage of being both time efficient and devoid of any pixel expansion. It can be applied to both grayscale as well as colour images and, as illustrated further ahead, ensures complete secrecy and regeneration of the original image from all the shares.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Naor, M., Shamir, A.: Visual cryptography. In: Advances in Cryptology—EUROCRYPT ’94. Lecture Notes in Computer Science, vol. 950, pp. 1–12. Springer, Berlin (1994) Naor, M., Shamir, A.: Visual cryptography. In: Advances in Cryptology—EUROCRYPT ’94. Lecture Notes in Computer Science, vol. 950, pp. 1–12. Springer, Berlin (1994)
2.
go back to reference Adhikari, A., Bose, M.: A new visual cryptographic scheme using Latin squares. IEICE Trans. Fundam. E87-A, 1998–2002 (2004) Adhikari, A., Bose, M.: A new visual cryptographic scheme using Latin squares. IEICE Trans. Fundam. E87-A, 1998–2002 (2004)
3.
go back to reference Zhou, Z., Arce, G.R., Crescenzo, G.D.: Halftone visual cryptography. IEEE Trans. Image Process. 15(8), 2441–2453 (2006) Zhou, Z., Arce, G.R., Crescenzo, G.D.: Halftone visual cryptography. IEEE Trans. Image Process. 15(8), 2441–2453 (2006)
4.
go back to reference Arya, K.V., Rishiwal, V., Yadav, A.K.: An efficient halftone visual secret sharing scheme. 2014 9th International Conference on Industrial and Information Systems (ICIIS), pp. 1, 5, 15–17 Dec 2014 Arya, K.V., Rishiwal, V., Yadav, A.K.: An efficient halftone visual secret sharing scheme. 2014 9th International Conference on Industrial and Information Systems (ICIIS), pp. 1, 5, 15–17 Dec 2014
5.
go back to reference Liu, F., Wu, C., Lin, X.: Step construction of visual cryptography schemes. IEEE Trans. Inf. Forensics Secur. 5(1), 27–38 (2010) Liu, F., Wu, C., Lin, X.: Step construction of visual cryptography schemes. IEEE Trans. Inf. Forensics Secur. 5(1), 27–38 (2010)
6.
go back to reference Liu, F, Wu, C.: Embedded extended visual cryptography schemes. IEEE Trans. Inf. Forensics Secur. 6(2), 307–322 (2011) Liu, F, Wu, C.: Embedded extended visual cryptography schemes. IEEE Trans. Inf. Forensics Secur. 6(2), 307–322 (2011)
7.
go back to reference Wang, R.-Z., Hsu, S.-F.: Tagged visual cryptography. IEEE Sig. Process. Lett. 18(11), 627–630 (2011) Wang, R.-Z., Hsu, S.-F.: Tagged visual cryptography. IEEE Sig. Process. Lett. 18(11), 627–630 (2011)
8.
go back to reference Reddy, B.D., Kumari, V.V., Raju, K.V.S.V.N, Raju, Y.H.P.: Visual cryptography using basic (2, 2) scheme. TECHNIA—Int. J. Comput. Sci. Commun. Technol. 3(2), 594–597 (2011). ISSN 0974-3375 Reddy, B.D., Kumari, V.V., Raju, K.V.S.V.N, Raju, Y.H.P.: Visual cryptography using basic (2, 2) scheme. TECHNIA—Int. J. Comput. Sci. Commun. Technol. 3(2), 594–597 (2011). ISSN 0974-3375
9.
go back to reference Lin, S.-J., Ho, W.: A probabilistic model of (t, n) visual cryptography scheme with dynamic group. IEEE Trans. Inf. Forensics Secur. 7(1), 197–207 (2012) Lin, S.-J., Ho, W.: A probabilistic model of (t, n) visual cryptography scheme with dynamic group. IEEE Trans. Inf. Forensics Secur. 7(1), 197–207 (2012)
10.
go back to reference Hu, C.-M., Tzeng, W.-G.: Cheating prevention in visual cryptography. Trans. Image Process. 16(1), 36–45 (2007) Hu, C.-M., Tzeng, W.-G.: Cheating prevention in visual cryptography. Trans. Image Process. 16(1), 36–45 (2007)
11.
go back to reference Das, S.S., Das Sharma, K., Bera, J.N.: A simple visual secret sharing scheme employing particle swarm optimization. 2014 International Conference on Control, Instrumentation, Energy and Communication (CIEC), pp. 646, 649, 31 Jan 2014–2 Feb 2014 Das, S.S., Das Sharma, K., Bera, J.N.: A simple visual secret sharing scheme employing particle swarm optimization. 2014 International Conference on Control, Instrumentation, Energy and Communication (CIEC), pp. 646, 649, 31 Jan 2014–2 Feb 2014
12.
go back to reference Hou, Y.-C., Quan, Z.-Y.: Progressive visual cryptography with unexpanded shares. Transactions letters. IEEE Trans. Circuits Syst. Video Technol. 21(11), 1760–1764 (2011) Hou, Y.-C., Quan, Z.-Y.: Progressive visual cryptography with unexpanded shares. Transactions letters. IEEE Trans. Circuits Syst. Video Technol. 21(11), 1760–1764 (2011)
13.
go back to reference Hou, Y.-C.: Visual Cryptography for Color Images. Department of Information Management, National Central University, Jung Li, Taiwan 320, ROC Received 6 June 2002, accepted 26 August 2002 Hou, Y.-C.: Visual Cryptography for Color Images. Department of Information Management, National Central University, Jung Li, Taiwan 320, ROC Received 6 June 2002, accepted 26 August 2002
14.
go back to reference Wu, X., Wong, D.S., Li, Q.: Threshold visual cryptography scheme for color images with no pixel expansion. In: Proceedings of the Second Symposium International Computer Science and Computational Technology(ISCSCT ’09), pp. 310–315. P. R. China, Huangshan, 26-28 Dec 2009. ISBN 978-952-5726-07-7 (Print), 978-952-5726-08-4 (CD-ROM) Wu, X., Wong, D.S., Li, Q.: Threshold visual cryptography scheme for color images with no pixel expansion. In: Proceedings of the Second Symposium International Computer Science and Computational Technology(ISCSCT ’09), pp. 310–315. P. R. China, Huangshan, 26-28 Dec 2009. ISBN 978-952-5726-07-7 (Print), 978-952-5726-08-4 (CD-ROM)
15.
go back to reference Sai Chandana, B., Anuradha, S.: A new visual cryptography scheme for color images. Int. J. Eng. Sci. Technol. 2(6), 2398–2407 (2010) Sai Chandana, B., Anuradha, S.: A new visual cryptography scheme for color images. Int. J. Eng. Sci. Technol. 2(6), 2398–2407 (2010)
16.
go back to reference Wang, D., Zhang, L., Ma, N., Li, X.: Two secret sharing schemes based on Boolean operations. Elsevier Pattern Recognit. 40, 2776–2785 (2007) Wang, D., Zhang, L., Ma, N., Li, X.: Two secret sharing schemes based on Boolean operations. Elsevier Pattern Recognit. 40, 2776–2785 (2007)
17.
go back to reference Wang, D.-S., Zhang, L., Ma, N., Huang, L.-S.: Secret color images sharing schemes based on XOR. Cryptology ePrint Archive: Report 2005/372 Wang, D.-S., Zhang, L., Ma, N., Huang, L.-S.: Secret color images sharing schemes based on XOR. Cryptology ePrint Archive: Report 2005/372
18.
go back to reference Harn, L., Lin, C.: An efficient group authentication for group communications. Int. J. Netw. Secur. Appl. (IJNSA) 5(3), 13–24 (2013) Harn, L., Lin, C.: An efficient group authentication for group communications. Int. J. Netw. Secur. Appl. (IJNSA) 5(3), 13–24 (2013)
20.
go back to reference Rosen, K.H.: Discrete Mathematics and Its Applications with Combinatorics and Graph Theory, 7th edn. McGraw Hill Education (India) Private Limited, 2008 Rosen, K.H.: Discrete Mathematics and Its Applications with Combinatorics and Graph Theory, 7th edn. McGraw Hill Education (India) Private Limited, 2008
Metadata
Title
A Time Efficient Secret Image Sharing Scheme for Group Authentication System Without Pixel Expansions
Authors
Samarpita Biswas
Nicole Belinda Dillen
Dipak Kumar Kole
Aruna Chakraborty
Copyright Year
2016
Publisher
Springer India
DOI
https://doi.org/10.1007/978-81-322-2526-3_7