Skip to main content
Top

2016 | OriginalPaper | Chapter

K Out of N Secret Sharing Scheme with Steganography and Authentication

Authors : P. Mohamed Fathimal, P. Arockia Jansi Rani

Published in: Computational Intelligence, Cyber Security and Computational Models

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With communication, preservation and processing of information becoming digital, security of such transactions is a matter of prime concern. This has resulted in the development of encryption and cryptography. The degree of security of confidential data is measured by the involvement of one or more people—at times security is guaranteed when a single hand is involved, while at others secrets kept in parts by many ensures security. This has given rise to secret sharing that has emerged as a hot area of research in computer science in the past decade. Existing schemes of secret sharing suffer from pixel expansion and degradation in visual quality of the recovered secret and cover images. This paper aims to develop a steganography and authenticated image sharing (SAIS) scheme for gray and color images with meaningful shares and the authentication ability to detect the manipulation of shadow images. The main features of this scheme is the use of simple Boolean and arithmetic operations and thus the computational complexity is reduced from O(nlog2n) to O(n).

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Noar, N., Shamir, A.: Visual Cryptography, Advances In Cryptology: Eurocrypt’94. Springer, Berlin (1995) Noar, N., Shamir, A.: Visual Cryptography, Advances In Cryptology: Eurocrypt’94. Springer, Berlin (1995)
2.
go back to reference Kang, I.K., Arce, G.R., Lee, H.K.: Color extended visual cryptography using error diffusion. IEEE Trans. Image Process. (2011) Kang, I.K., Arce, G.R., Lee, H.K.: Color extended visual cryptography using error diffusion. IEEE Trans. Image Process. (2011)
4.
go back to reference Blakley, G.R.: Safeguarding cryptographic keys. In: Proceedings of FIPS National Computer Conference, vol. 48, pp. 313–317 (1979) Blakley, G.R.: Safeguarding cryptographic keys. In: Proceedings of FIPS National Computer Conference, vol. 48, pp. 313–317 (1979)
5.
go back to reference Chang, C.-C., Lin, P.-Y., Wang, Z.H, Li, M.C.: A sudoku-based secret image sharing scheme with reversibility. J. Commun. 5(1) (2010) Chang, C.-C., Lin, P.-Y., Wang, Z.H, Li, M.C.: A sudoku-based secret image sharing scheme with reversibility. J. Commun. 5(1) (2010)
6.
go back to reference Thien, C.C., Lin, J.C.: Secret image sharing. Comput. Graph. 26, 765 (2002) Thien, C.C., Lin, J.C.: Secret image sharing. Comput. Graph. 26, 765 (2002)
7.
go back to reference Ahmad, T., Studiawan, H., Ahmad, H.S., Ijtihadie, R.M., Wibisono, W.: Shared secret-based Steganography for protecting medical data. In: International Conference on Computer, Control, Informatics and Its Applications, (2014) Ahmad, T., Studiawan, H., Ahmad, H.S., Ijtihadie, R.M., Wibisono, W.: Shared secret-based Steganography for protecting medical data. In: International Conference on Computer, Control, Informatics and Its Applications, (2014)
8.
go back to reference Lin, C., Tsai, W.: Secret image sharing with steganography and authentication. J. Syst. Softw. 405–414 (2004) Lin, C., Tsai, W.: Secret image sharing with steganography and authentication. J. Syst. Softw. 405–414 (2004)
9.
go back to reference Yang, C.N., Chen, T.C., Yu, K.H., Wang, C.C.: Improvements of image sharing with steganography and authentication.. J. Syst. Softw. 1070 (2007) Yang, C.N., Chen, T.C., Yu, K.H., Wang, C.C.: Improvements of image sharing with steganography and authentication.. J. Syst. Softw. 1070 (2007)
10.
go back to reference Chang, C., Hsieh, Y., Lin, C.: Sharing secrets in stego images with authentication. Pattern Recogn. 3130–3137 (2008) Chang, C., Hsieh, Y., Lin, C.: Sharing secrets in stego images with authentication. Pattern Recogn. 3130–3137 (2008)
11.
go back to reference Eslami, Z., Razzaghi, S.H., Ahmadabadi, J.Z.: Secret image sharing based on cellular automata and steganography. Pattern Recogn. 43, 397 (2010) Eslami, Z., Razzaghi, S.H., Ahmadabadi, J.Z.: Secret image sharing based on cellular automata and steganography. Pattern Recogn. 43, 397 (2010)
12.
go back to reference Yang, C.-N., Ouyang, J.-F., Harn, L.: Steganography and authentication in image sharing without parity bits. Opt. Commun. 1725–1735 (2012) Yang, C.-N., Ouyang, J.-F., Harn, L.: Steganography and authentication in image sharing without parity bits. Opt. Commun. 1725–1735 (2012)
13.
go back to reference Fathimal, P.M., Rani, P.A.J.: K out of N secret sharing scheme for gray and color images. In: IEEE International Conference on Electrical, Computer and Communication Technologies, March 2015 Fathimal, P.M., Rani, P.A.J.: K out of N secret sharing scheme for gray and color images. In: IEEE International Conference on Electrical, Computer and Communication Technologies, March 2015
14.
go back to reference Fathimal, P.M., Rani, P.A.J.: Bidirectional serpentine scan based error diffusion technique for color image visual cryptography. Int. J. Sci. Eng. Technol. Res. (2014) Fathimal, P.M., Rani, P.A.J.: Bidirectional serpentine scan based error diffusion technique for color image visual cryptography. Int. J. Sci. Eng. Technol. Res. (2014)
15.
go back to reference Fathimal, P.M., Rani, P.A.J.: (N, N) Secret color image sharing scheme with dynamic group. Int. J. Comput. Netw. Inf. Secur. (2015) Fathimal, P.M., Rani, P.A.J.: (N, N) Secret color image sharing scheme with dynamic group. Int. J. Comput. Netw. Inf. Secur. (2015)
16.
go back to reference Fathimal, P.M., Rani, P.A.J.: Design of block based visual secret sharing scheme for color images. Int. J. Appl. Eng. Res. (2015) Fathimal, P.M., Rani, P.A.J.: Design of block based visual secret sharing scheme for color images. Int. J. Appl. Eng. Res. (2015)
Metadata
Title
K Out of N Secret Sharing Scheme with Steganography and Authentication
Authors
P. Mohamed Fathimal
P. Arockia Jansi Rani
Copyright Year
2016
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-0251-9_39

Premium Partner