Skip to main content
Top
Published in: Arabian Journal for Science and Engineering 2/2022

08-10-2021 | Research Article-Computer Engineering and Computer Science

Increasing Participants Using Counting-Based Secret Sharing via Involving Matrices and Practical Steganography

Authors: Faiza Al-Shaarani, Adnan Gutub

Published in: Arabian Journal for Science and Engineering | Issue 2/2022

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Secret sharing is an approach for accessing sensitive information by several authorized participants. It shares the secret key in different forms among several authorized participants, where a certain number of which is required to retrieve the original secret. This secret sharing raised a new practicality challenge of human secrecy memorization as well as limited number of users allowed, which have been addressed within this work. This paper examines two particular secret sharing techniques known as the counting-based secret sharing and the matrix-based secret sharing, which enhances the former to accommodate a high number of participants. This work aimed to serve participants accommodating the share’s memorization challenge via image steganography as well as testing both schemes in the cases of original 1-bit and 2-bit methods. We compared practicality applying the secret sharing methods combined with two image steganography methods: the least significant bit and the discrete wavelet transform. Our findings included interesting remarks regarding both security and robustness. Our results demonstrated that despite the large number of shares generated, as to serve more participants using the matrix-based scheme, its performance was highly satisfactory. Our experiments illustrated high imperceptibility levels for the matrix-based scheme, which in turn provides higher security and robustness compared to the original method, which provided very few shares serving a limited number of participants.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Kini, N.; Kini, V.; Gautam: A Secured Steganography Algorithm for Hiding an Image in an Image. Studies in Computational Intelligence, Vol. 771, p. 539–546. Springer (2019) Kini, N.; Kini, V.; Gautam: A Secured Steganography Algorithm for Hiding an Image in an Image. Studies in Computational Intelligence, Vol. 771, p. 539–546. Springer (2019)
10.
go back to reference Hamid, N.; Yahya, A.; Ahmad, R.B.; Al-Qershi, O.M.: Image steganography techniques: an overview. Int. J. Comput. Sci. Secur. 6(3), 168–187 (2012) Hamid, N.; Yahya, A.; Ahmad, R.B.; Al-Qershi, O.M.: Image steganography techniques: an overview. Int. J. Comput. Sci. Secur. 6(3), 168–187 (2012)
12.
go back to reference Hamid, N., Yahya, A., Ahmad, R.B., Najim, L., Perlis, K.K.: Steganography in image files : a survey School of Computer and Communication Engineering University Malaysia Perlis (UniMAP) Ministry of Science and Technology Iraq, Baghdad 7(1), 35–55 (2013) Hamid, N., Yahya, A., Ahmad, R.B., Najim, L., Perlis, K.K.: Steganography in image files : a survey School of Computer and Communication Engineering University Malaysia Perlis (UniMAP) Ministry of Science and Technology Iraq, Baghdad 7(1), 35–55 (2013)
22.
go back to reference Fukumitsu, M., Hasegawa, S., Iwazaki, J., Sakai, M., Takahashi, D.: A proposal of a secure P2P-type storage scheme by using the secret sharing and the blockchain. In: International Conference on Advanced Information Networking and Applications, AINA, 2017, pp. 803–810. https://doi.org/10.1109/AINA.2017.11 Fukumitsu, M., Hasegawa, S., Iwazaki, J., Sakai, M., Takahashi, D.: A proposal of a secure P2P-type storage scheme by using the secret sharing and the blockchain. In: International Conference on Advanced Information Networking and Applications, AINA, 2017, pp. 803–810. https://​doi.​org/​10.​1109/​AINA.​2017.​11
24.
go back to reference Rashid Ibrahim, D., Sen Teh, J., Abdullah, R., Ibrahim, D.R., Teh, J.S., Abdullah, R., Multifactor authentication system based on color visual cryptography, facial recognition and dragonfly optimization ARTICLE multifactor authentication system based on color visual cryptography, facial recognition and dragonfly optimization. Artic. Inf. Secur. J. A Glob. Perspect. 30(3): 149–159 (2020). https://doi.org/10.1080/19393555.2020.1817633 Rashid Ibrahim, D., Sen Teh, J., Abdullah, R., Ibrahim, D.R., Teh, J.S., Abdullah, R., Multifactor authentication system based on color visual cryptography, facial recognition and dragonfly optimization ARTICLE multifactor authentication system based on color visual cryptography, facial recognition and dragonfly optimization. Artic. Inf. Secur. J. A Glob. Perspect. 30(3): 149–159 (2020). https://​doi.​org/​10.​1080/​19393555.​2020.​1817633
31.
go back to reference Gutub, A.: Watermarking images via counting-based secret-sharing for lightweight semi-complete authentication. Int. J. Inf. Secur. Privacy (IJISP), Accepted in 2021, in press to appear in Vol. 16, No. 1, Aricle 18 Gutub, A.: Watermarking images via counting-based secret-sharing for lightweight semi-complete authentication. Int. J. Inf. Secur. Privacy (IJISP), Accepted in 2021, in press to appear in Vol. 16, No. 1, Aricle 18
Metadata
Title
Increasing Participants Using Counting-Based Secret Sharing via Involving Matrices and Practical Steganography
Authors
Faiza Al-Shaarani
Adnan Gutub
Publication date
08-10-2021
Publisher
Springer Berlin Heidelberg
Published in
Arabian Journal for Science and Engineering / Issue 2/2022
Print ISSN: 2193-567X
Electronic ISSN: 2191-4281
DOI
https://doi.org/10.1007/s13369-021-06165-7

Other articles of this Issue 2/2022

Arabian Journal for Science and Engineering 2/2022 Go to the issue

Research Article-Computer Engineering and Computer Science

Automated Query Relaxation Mechanism for QoS-Aware Service Provisioning

Research Article-Computer Engineering and Computer Science

Thermal Comfort Model for HVAC Buildings Using Machine Learning

Research Article-Computer Engineering and Computer Science

Bipolar Mating Tendency: Harmony Between the Best and the Worst Individuals

Premium Partners