Skip to main content

2024 | OriginalPaper | Buchkapitel

Proposed Multilevel Secret Images-Sharing Scheme

verfasst von : Nahidah T. Darweesh, Ali Makki Sagheer

Erschienen in: Proceedings of Third International Conference on Computing and Communication Networks

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Visual secret-sharing (VSS) applications are essential for guaranteeing the secure and private sharing of sensitive information. The Multilevel Secret Image-Sharing Scheme (MLSIS) is introduced in this paper as an effective method for securely sharing secret images among participants with various access levels. The aim was to give thorough conclusions and comparisons while upholding accuracy in how the data was presented. For pixel-level access control and secrecy, the model of the multilevel secret image-sharing offered in this work employs a bit-level technique and the RC4 encryption algorithm to securely share an image through multilevel participants. The model involves three levels, each with an exact number of participants. The primary objective is to distribute shares in a way that permits each level to reconstruct the secret image by combining at least the lowest required number of participants according to their own thresholds (k, n). The Multilevel Secret Image-Sharing Scheme described in this study provides a reliable and effective solution for users with varying levels of access to share confidential secret images. The bit-level approach and potent encryption algorithms work together to provide secrecy and limited access to the shared images. The model’s successful use in real-world circumstances is demonstrated by its practical implementations.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Xing, F., Yan, X., Yu, L., et al.: A novel general (n, n)-threshold multiple secret images sharing scheme based on information hiding in the sharing domain. Entropy 24(3), 318 (2022)MathSciNetCrossRef Xing, F., Yan, X., Yu, L., et al.: A novel general (n, n)-threshold multiple secret images sharing scheme based on information hiding in the sharing domain. Entropy 24(3), 318 (2022)MathSciNetCrossRef
2.
Zurück zum Zitat Mohammed, V.A., Samundiswary, P.: An XOR-based Multiple Medical Image Sharing using Visual Secret Sharing, pp. 793–799 Mohammed, V.A., Samundiswary, P.: An XOR-based Multiple Medical Image Sharing using Visual Secret Sharing, pp. 793–799
3.
Zurück zum Zitat Gutub, A., Al-Ghamdi, M.: Hiding shares by multimedia image steganography for optimized counting-based secret sharing. Multimedia Tools Appl. 79(11–12), 7951–7985 (2020)CrossRef Gutub, A., Al-Ghamdi, M.: Hiding shares by multimedia image steganography for optimized counting-based secret sharing. Multimedia Tools Appl. 79(11–12), 7951–7985 (2020)CrossRef
4.
Zurück zum Zitat Dhinakaran, D., Prathap, P.: Preserving data confidentiality in association rule mining using data share allocator algorithm (2023). arXiv preprint arXiv:2304.14605 Dhinakaran, D., Prathap, P.: Preserving data confidentiality in association rule mining using data share allocator algorithm (2023). arXiv preprint arXiv:​2304.​14605
5.
Zurück zum Zitat Kumar, M., Soni, A., Shekhawat, A.R.S., et al.: Enhanced digital image and text data security using hybrid model of LSB steganography and AES cryptography technique, pp. 1453–1457 Kumar, M., Soni, A., Shekhawat, A.R.S., et al.: Enhanced digital image and text data security using hybrid model of LSB steganography and AES cryptography technique, pp. 1453–1457
6.
Zurück zum Zitat Georgi, P., Wei, Q., Sain, B., et al.: Optical secret sharing with cascaded metasurface holography. Sci. Adv. 7(16), eabf9718 Georgi, P., Wei, Q., Sain, B., et al.: Optical secret sharing with cascaded metasurface holography. Sci. Adv. 7(16), eabf9718
7.
Zurück zum Zitat Galletta, A., Taheri, J., Celesti, A., et al.: Investigating the applicability of nested secret share for drone fleet photo storage. IEEE Trans. Mobile Comput. (2023) Galletta, A., Taheri, J., Celesti, A., et al.: Investigating the applicability of nested secret share for drone fleet photo storage. IEEE Trans. Mobile Comput. (2023)
8.
Zurück zum Zitat Veitch, S.: Contextualizing Alternative Models of Secret Sharing. University of Waterloo (2022) Veitch, S.: Contextualizing Alternative Models of Secret Sharing. University of Waterloo (2022)
9.
Zurück zum Zitat Meikap, S., Jana, B.: Reference pixel-based reversible data hiding scheme using multi-level pixel value ordering. Multimedia Tools Appl. 1–34 (2023) Meikap, S., Jana, B.: Reference pixel-based reversible data hiding scheme using multi-level pixel value ordering. Multimedia Tools Appl. 1–34 (2023)
10.
Zurück zum Zitat Kunhoth, J., Subramanian, N., Al-Maadeed, S., et al.: Video steganography: recent advances and challenges. Multimedia Tools Appl. 1–43 (2023) Kunhoth, J., Subramanian, N., Al-Maadeed, S., et al.: Video steganography: recent advances and challenges. Multimedia Tools Appl. 1–43 (2023)
11.
Zurück zum Zitat Kumar, A., Rani, R., Singh, S.: A survey of recent advances in image steganography. Secur. Privacy 6(3), e281 (2023)CrossRef Kumar, A., Rani, R., Singh, S.: A survey of recent advances in image steganography. Secur. Privacy 6(3), e281 (2023)CrossRef
12.
Zurück zum Zitat Sajitha, A., Sridevi Sathya Priya, S.: Analysis of various visual cryptographic techniques and their issues based on optimization algorithms. Int. J. Image Graph. 2350059 (2022) Sajitha, A., Sridevi Sathya Priya, S.: Analysis of various visual cryptographic techniques and their issues based on optimization algorithms. Int. J. Image Graph. 2350059 (2022)
13.
Zurück zum Zitat Das, A., Adhikari, A.: An efficient multi-use multi-secret sharing scheme based on hash function. Appl. Math. Lett. 23(9), 993–996 (2010)MathSciNetCrossRef Das, A., Adhikari, A.: An efficient multi-use multi-secret sharing scheme based on hash function. Appl. Math. Lett. 23(9), 993–996 (2010)MathSciNetCrossRef
14.
Zurück zum Zitat Kumar, P.S., Kurra, R.R., Tentu, A.N., et al.: Multi-level secret sharing scheme for mobile ad-hoc networks. Int. J. Adv. Netw. Appl. 6(2), 2253 (2014) Kumar, P.S., Kurra, R.R., Tentu, A.N., et al.: Multi-level secret sharing scheme for mobile ad-hoc networks. Int. J. Adv. Netw. Appl. 6(2), 2253 (2014)
15.
Zurück zum Zitat Harn, L., Fuyou, M.: Multilevel threshold secret sharing based on the Chinese Remainder Theorem. Inf. Process. Lett. 114(9), 504–509 (2014)MathSciNetCrossRef Harn, L., Fuyou, M.: Multilevel threshold secret sharing based on the Chinese Remainder Theorem. Inf. Process. Lett. 114(9), 504–509 (2014)MathSciNetCrossRef
16.
Zurück zum Zitat Basit, A., Kumar, N.C., Venkaiah, V.C., et al.: Multi-stage multi-secret sharing scheme for hierarchical access structure, 557–563 Basit, A., Kumar, N.C., Venkaiah, V.C., et al.: Multi-stage multi-secret sharing scheme for hierarchical access structure, 557–563
17.
Zurück zum Zitat Chen, D., Lu, W., Xing, W., et al.: An efficient verifiable threshold multi-secret sharing scheme with different stages. IEEE Access 7, 107104–107110 (2019)CrossRef Chen, D., Lu, W., Xing, W., et al.: An efficient verifiable threshold multi-secret sharing scheme with different stages. IEEE Access 7, 107104–107110 (2019)CrossRef
18.
Zurück zum Zitat Chattopadhyay, A.K., Nag, A., Singh, J.P., et al.: A verifiable multi-secret image sharing scheme using XOR operation and hash function. Multimedia Tools Appl 80, 35051–35080 (2021)CrossRef Chattopadhyay, A.K., Nag, A., Singh, J.P., et al.: A verifiable multi-secret image sharing scheme using XOR operation and hash function. Multimedia Tools Appl 80, 35051–35080 (2021)CrossRef
19.
Zurück zum Zitat Hu, F., Yao, Y., Li, W., et al.: Threshold meaningful secret image sharing scheme based on QR code. Secur. Commun. Netw. 2022 (2022) Hu, F., Yao, Y., Li, W., et al.: Threshold meaningful secret image sharing scheme based on QR code. Secur. Commun. Netw. 2022 (2022)
20.
Zurück zum Zitat Kang, Y., Kanwal, S., Pu, S., et al.: Ghost imaging-based optical multilevel authentication scheme using visual cryptography. Optics Commun. 526, 128896 (2023)CrossRef Kang, Y., Kanwal, S., Pu, S., et al.: Ghost imaging-based optical multilevel authentication scheme using visual cryptography. Optics Commun. 526, 128896 (2023)CrossRef
21.
Zurück zum Zitat Zhang, D., Gu, Z.: A high-quality authenticatable visual secret sharing scheme using SGX. Wirel. Commun. Mob. Comput. 2021, 1–12 (2021)CrossRef Zhang, D., Gu, Z.: A high-quality authenticatable visual secret sharing scheme using SGX. Wirel. Commun. Mob. Comput. 2021, 1–12 (2021)CrossRef
22.
Zurück zum Zitat Deshmukh, M., Nain, N., Ahmed, M.: A novel approach for sharing multiple color images by employing Chinese Remainder Theorem. J. Vis. Commun. Image Represent. 49, 291–302 (2017)CrossRef Deshmukh, M., Nain, N., Ahmed, M.: A novel approach for sharing multiple color images by employing Chinese Remainder Theorem. J. Vis. Commun. Image Represent. 49, 291–302 (2017)CrossRef
23.
Zurück zum Zitat Chen, T.-H., Wu, C.-S.: Efficient multi-secret image sharing based on Boolean operations. Signal Process. 91(1), 90–97 (2011)CrossRef Chen, T.-H., Wu, C.-S.: Efficient multi-secret image sharing based on Boolean operations. Signal Process. 91(1), 90–97 (2011)CrossRef
24.
Zurück zum Zitat Shi, W., Caballero, J., Huszár, F., et al.: Real-time single image and video super-resolution using an efficient sub-pixel convolutional neural network, 1874–1883 Shi, W., Caballero, J., Huszár, F., et al.: Real-time single image and video super-resolution using an efficient sub-pixel convolutional neural network, 1874–1883
25.
Zurück zum Zitat Sajjadi, M.S., Scholkopf, B., Hirsch, M.: Enhancenet: Single image super-resolution through automated texture synthesis, 4491–4500 Sajjadi, M.S., Scholkopf, B., Hirsch, M.: Enhancenet: Single image super-resolution through automated texture synthesis, 4491–4500
26.
Zurück zum Zitat AlKhodaidi, T., Gutub, A.: Refining image steganography distribution for higher security multimedia counting-based secret-sharing. Multimedia Tools Appl. 80, 1143–1173 (2021)CrossRef AlKhodaidi, T., Gutub, A.: Refining image steganography distribution for higher security multimedia counting-based secret-sharing. Multimedia Tools Appl. 80, 1143–1173 (2021)CrossRef
27.
Zurück zum Zitat Sagheer, A.M., Abed, L.H.: Visual secret sharing without pixel expansion. Int. J. Digital Crime Forens. (IJDCF) 7(2), 20–30 (2015)CrossRef Sagheer, A.M., Abed, L.H.: Visual secret sharing without pixel expansion. Int. J. Digital Crime Forens. (IJDCF) 7(2), 20–30 (2015)CrossRef
28.
Zurück zum Zitat Rani, M.M.S., Lakshmanan, S., Saranya, P.: Video Steganography Using Mid-Prime and Discrete Wavelet Technique. Int. J. Comput. Engin. Appl. 180–190 (2017) Rani, M.M.S., Lakshmanan, S., Saranya, P.: Video Steganography Using Mid-Prime and Discrete Wavelet Technique. Int. J. Comput. Engin. Appl. 180–190 (2017)
Metadaten
Titel
Proposed Multilevel Secret Images-Sharing Scheme
verfasst von
Nahidah T. Darweesh
Ali Makki Sagheer
Copyright-Jahr
2024
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-97-0892-5_42