Skip to main content
Top

2024 | OriginalPaper | Chapter

Proposed Multilevel Secret Images-Sharing Scheme

Authors : Nahidah T. Darweesh, Ali Makki Sagheer

Published in: Proceedings of Third International Conference on Computing and Communication Networks

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Visual secret-sharing (VSS) applications are essential for guaranteeing the secure and private sharing of sensitive information. The Multilevel Secret Image-Sharing Scheme (MLSIS) is introduced in this paper as an effective method for securely sharing secret images among participants with various access levels. The aim was to give thorough conclusions and comparisons while upholding accuracy in how the data was presented. For pixel-level access control and secrecy, the model of the multilevel secret image-sharing offered in this work employs a bit-level technique and the RC4 encryption algorithm to securely share an image through multilevel participants. The model involves three levels, each with an exact number of participants. The primary objective is to distribute shares in a way that permits each level to reconstruct the secret image by combining at least the lowest required number of participants according to their own thresholds (k, n). The Multilevel Secret Image-Sharing Scheme described in this study provides a reliable and effective solution for users with varying levels of access to share confidential secret images. The bit-level approach and potent encryption algorithms work together to provide secrecy and limited access to the shared images. The model’s successful use in real-world circumstances is demonstrated by its practical implementations.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Xing, F., Yan, X., Yu, L., et al.: A novel general (n, n)-threshold multiple secret images sharing scheme based on information hiding in the sharing domain. Entropy 24(3), 318 (2022)MathSciNetCrossRef Xing, F., Yan, X., Yu, L., et al.: A novel general (n, n)-threshold multiple secret images sharing scheme based on information hiding in the sharing domain. Entropy 24(3), 318 (2022)MathSciNetCrossRef
2.
go back to reference Mohammed, V.A., Samundiswary, P.: An XOR-based Multiple Medical Image Sharing using Visual Secret Sharing, pp. 793–799 Mohammed, V.A., Samundiswary, P.: An XOR-based Multiple Medical Image Sharing using Visual Secret Sharing, pp. 793–799
3.
go back to reference Gutub, A., Al-Ghamdi, M.: Hiding shares by multimedia image steganography for optimized counting-based secret sharing. Multimedia Tools Appl. 79(11–12), 7951–7985 (2020)CrossRef Gutub, A., Al-Ghamdi, M.: Hiding shares by multimedia image steganography for optimized counting-based secret sharing. Multimedia Tools Appl. 79(11–12), 7951–7985 (2020)CrossRef
4.
go back to reference Dhinakaran, D., Prathap, P.: Preserving data confidentiality in association rule mining using data share allocator algorithm (2023). arXiv preprint arXiv:2304.14605 Dhinakaran, D., Prathap, P.: Preserving data confidentiality in association rule mining using data share allocator algorithm (2023). arXiv preprint arXiv:​2304.​14605
5.
go back to reference Kumar, M., Soni, A., Shekhawat, A.R.S., et al.: Enhanced digital image and text data security using hybrid model of LSB steganography and AES cryptography technique, pp. 1453–1457 Kumar, M., Soni, A., Shekhawat, A.R.S., et al.: Enhanced digital image and text data security using hybrid model of LSB steganography and AES cryptography technique, pp. 1453–1457
6.
go back to reference Georgi, P., Wei, Q., Sain, B., et al.: Optical secret sharing with cascaded metasurface holography. Sci. Adv. 7(16), eabf9718 Georgi, P., Wei, Q., Sain, B., et al.: Optical secret sharing with cascaded metasurface holography. Sci. Adv. 7(16), eabf9718
7.
go back to reference Galletta, A., Taheri, J., Celesti, A., et al.: Investigating the applicability of nested secret share for drone fleet photo storage. IEEE Trans. Mobile Comput. (2023) Galletta, A., Taheri, J., Celesti, A., et al.: Investigating the applicability of nested secret share for drone fleet photo storage. IEEE Trans. Mobile Comput. (2023)
8.
go back to reference Veitch, S.: Contextualizing Alternative Models of Secret Sharing. University of Waterloo (2022) Veitch, S.: Contextualizing Alternative Models of Secret Sharing. University of Waterloo (2022)
9.
go back to reference Meikap, S., Jana, B.: Reference pixel-based reversible data hiding scheme using multi-level pixel value ordering. Multimedia Tools Appl. 1–34 (2023) Meikap, S., Jana, B.: Reference pixel-based reversible data hiding scheme using multi-level pixel value ordering. Multimedia Tools Appl. 1–34 (2023)
10.
go back to reference Kunhoth, J., Subramanian, N., Al-Maadeed, S., et al.: Video steganography: recent advances and challenges. Multimedia Tools Appl. 1–43 (2023) Kunhoth, J., Subramanian, N., Al-Maadeed, S., et al.: Video steganography: recent advances and challenges. Multimedia Tools Appl. 1–43 (2023)
11.
go back to reference Kumar, A., Rani, R., Singh, S.: A survey of recent advances in image steganography. Secur. Privacy 6(3), e281 (2023)CrossRef Kumar, A., Rani, R., Singh, S.: A survey of recent advances in image steganography. Secur. Privacy 6(3), e281 (2023)CrossRef
12.
go back to reference Sajitha, A., Sridevi Sathya Priya, S.: Analysis of various visual cryptographic techniques and their issues based on optimization algorithms. Int. J. Image Graph. 2350059 (2022) Sajitha, A., Sridevi Sathya Priya, S.: Analysis of various visual cryptographic techniques and their issues based on optimization algorithms. Int. J. Image Graph. 2350059 (2022)
13.
go back to reference Das, A., Adhikari, A.: An efficient multi-use multi-secret sharing scheme based on hash function. Appl. Math. Lett. 23(9), 993–996 (2010)MathSciNetCrossRef Das, A., Adhikari, A.: An efficient multi-use multi-secret sharing scheme based on hash function. Appl. Math. Lett. 23(9), 993–996 (2010)MathSciNetCrossRef
14.
go back to reference Kumar, P.S., Kurra, R.R., Tentu, A.N., et al.: Multi-level secret sharing scheme for mobile ad-hoc networks. Int. J. Adv. Netw. Appl. 6(2), 2253 (2014) Kumar, P.S., Kurra, R.R., Tentu, A.N., et al.: Multi-level secret sharing scheme for mobile ad-hoc networks. Int. J. Adv. Netw. Appl. 6(2), 2253 (2014)
15.
go back to reference Harn, L., Fuyou, M.: Multilevel threshold secret sharing based on the Chinese Remainder Theorem. Inf. Process. Lett. 114(9), 504–509 (2014)MathSciNetCrossRef Harn, L., Fuyou, M.: Multilevel threshold secret sharing based on the Chinese Remainder Theorem. Inf. Process. Lett. 114(9), 504–509 (2014)MathSciNetCrossRef
16.
go back to reference Basit, A., Kumar, N.C., Venkaiah, V.C., et al.: Multi-stage multi-secret sharing scheme for hierarchical access structure, 557–563 Basit, A., Kumar, N.C., Venkaiah, V.C., et al.: Multi-stage multi-secret sharing scheme for hierarchical access structure, 557–563
17.
go back to reference Chen, D., Lu, W., Xing, W., et al.: An efficient verifiable threshold multi-secret sharing scheme with different stages. IEEE Access 7, 107104–107110 (2019)CrossRef Chen, D., Lu, W., Xing, W., et al.: An efficient verifiable threshold multi-secret sharing scheme with different stages. IEEE Access 7, 107104–107110 (2019)CrossRef
18.
go back to reference Chattopadhyay, A.K., Nag, A., Singh, J.P., et al.: A verifiable multi-secret image sharing scheme using XOR operation and hash function. Multimedia Tools Appl 80, 35051–35080 (2021)CrossRef Chattopadhyay, A.K., Nag, A., Singh, J.P., et al.: A verifiable multi-secret image sharing scheme using XOR operation and hash function. Multimedia Tools Appl 80, 35051–35080 (2021)CrossRef
19.
go back to reference Hu, F., Yao, Y., Li, W., et al.: Threshold meaningful secret image sharing scheme based on QR code. Secur. Commun. Netw. 2022 (2022) Hu, F., Yao, Y., Li, W., et al.: Threshold meaningful secret image sharing scheme based on QR code. Secur. Commun. Netw. 2022 (2022)
20.
go back to reference Kang, Y., Kanwal, S., Pu, S., et al.: Ghost imaging-based optical multilevel authentication scheme using visual cryptography. Optics Commun. 526, 128896 (2023)CrossRef Kang, Y., Kanwal, S., Pu, S., et al.: Ghost imaging-based optical multilevel authentication scheme using visual cryptography. Optics Commun. 526, 128896 (2023)CrossRef
21.
go back to reference Zhang, D., Gu, Z.: A high-quality authenticatable visual secret sharing scheme using SGX. Wirel. Commun. Mob. Comput. 2021, 1–12 (2021)CrossRef Zhang, D., Gu, Z.: A high-quality authenticatable visual secret sharing scheme using SGX. Wirel. Commun. Mob. Comput. 2021, 1–12 (2021)CrossRef
22.
go back to reference Deshmukh, M., Nain, N., Ahmed, M.: A novel approach for sharing multiple color images by employing Chinese Remainder Theorem. J. Vis. Commun. Image Represent. 49, 291–302 (2017)CrossRef Deshmukh, M., Nain, N., Ahmed, M.: A novel approach for sharing multiple color images by employing Chinese Remainder Theorem. J. Vis. Commun. Image Represent. 49, 291–302 (2017)CrossRef
23.
go back to reference Chen, T.-H., Wu, C.-S.: Efficient multi-secret image sharing based on Boolean operations. Signal Process. 91(1), 90–97 (2011)CrossRef Chen, T.-H., Wu, C.-S.: Efficient multi-secret image sharing based on Boolean operations. Signal Process. 91(1), 90–97 (2011)CrossRef
24.
go back to reference Shi, W., Caballero, J., Huszár, F., et al.: Real-time single image and video super-resolution using an efficient sub-pixel convolutional neural network, 1874–1883 Shi, W., Caballero, J., Huszár, F., et al.: Real-time single image and video super-resolution using an efficient sub-pixel convolutional neural network, 1874–1883
25.
go back to reference Sajjadi, M.S., Scholkopf, B., Hirsch, M.: Enhancenet: Single image super-resolution through automated texture synthesis, 4491–4500 Sajjadi, M.S., Scholkopf, B., Hirsch, M.: Enhancenet: Single image super-resolution through automated texture synthesis, 4491–4500
26.
go back to reference AlKhodaidi, T., Gutub, A.: Refining image steganography distribution for higher security multimedia counting-based secret-sharing. Multimedia Tools Appl. 80, 1143–1173 (2021)CrossRef AlKhodaidi, T., Gutub, A.: Refining image steganography distribution for higher security multimedia counting-based secret-sharing. Multimedia Tools Appl. 80, 1143–1173 (2021)CrossRef
27.
go back to reference Sagheer, A.M., Abed, L.H.: Visual secret sharing without pixel expansion. Int. J. Digital Crime Forens. (IJDCF) 7(2), 20–30 (2015)CrossRef Sagheer, A.M., Abed, L.H.: Visual secret sharing without pixel expansion. Int. J. Digital Crime Forens. (IJDCF) 7(2), 20–30 (2015)CrossRef
28.
go back to reference Rani, M.M.S., Lakshmanan, S., Saranya, P.: Video Steganography Using Mid-Prime and Discrete Wavelet Technique. Int. J. Comput. Engin. Appl. 180–190 (2017) Rani, M.M.S., Lakshmanan, S., Saranya, P.: Video Steganography Using Mid-Prime and Discrete Wavelet Technique. Int. J. Comput. Engin. Appl. 180–190 (2017)
Metadata
Title
Proposed Multilevel Secret Images-Sharing Scheme
Authors
Nahidah T. Darweesh
Ali Makki Sagheer
Copyright Year
2024
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-97-0892-5_42