Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Secure image sharing method over unsecured channels

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Image sharing has become a prominent field in large and small networks. However, in order to deliver the shares to their respective shareholders, we need a secure channel to protect the shares from potential attacks by other users on the network. These users can locate the shares and retrieve the image using the Lagrange interpolation method if they are able to locate the minimum required number of shares. This paper proposes a method to protect the privacy and security of the shares when sending them through unsecured channels. The proposed method is divided into three phases. In the first phase, image pixels are changed using the column and row indices, then the shares are created using Shamir’s secret sharing (SSS) method. Then a relationship is created between the shares using a linear independence function. In the second phase, the first part of the image is encrypted to hide the solver data. Finally, in the third phase, the data is shared using the SSS method. Participants can retrieve the whole image by applying the reverse order of the proposed method using only the information from the sender through the same channel. The simulation results show that the proposed method is efficient and robust against different types of attacks and can be used to send the shares over unsecured channels.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Alharthi S, Atrey PK (2010) Further improvements on secret image sharing scheme. In: Proceedings of the 2nd workshop on Multimedia in forensics, security and intelligence. ACM, pp 53–58

  2. Atrey PK, Alharthi S, Anwar Hossain M, AlGhamdi A, El Saadik A (2013) Collective control over sensitive video data using secret sharing. Multimed Tools Appl. doi:10.1007/s11042-013-1644-0.

  3. Blakley GR (1899) Safeguarding cryptographic keys. In: International workshop on managing requirements knowledge. IEEE Computer Society, p 313

  4. Chang C-C, Lin P-Y, Wang ZH, Li MC (2010) A sudoku-based secret image sharing scheme with reversibility. J Commun 5(1):5–12

    Article  Google Scholar 

  5. Chen LS-T, Su W-K, Lin J-C (2009) Secret image sharing based on vector quantization. Int J Circ Syst Signal Process 3:137–144

    Google Scholar 

  6. Cao Y-y, Fu C (2008) An image encryption scheme based on high dimension chaos system. In: International conference on intelligent computation technology and automation (ICICTA), vol 2. IEEE, pp 104–108

  7. Chen Y-H, Huang H-C Coevolutionary genetic watermarking for owner identification. Neural Comput Applic 1–8

  8. Delei J, Sen B, Wenming D (2008) An image encryption algorithm based on knight’s tour and slip encryption-filter. In: International conference on computer science and software engineering, vol 1. IEEE, pp 251–255

  9. Devaki P, Raghavendra Rao G (2012) Lossless reconstruction of secret image using threshold secret sharing and transformation. Int J Netw Secur Appl 4(3)

  10. Dong L, Wang D, Ku M, Dai Y (2010) (2, n) secret image sharing scheme with ideal contrast. In: International conference on computational intelligence and security (CIS). IEEE, pp 421–424

  11. Encyclopedia of Mathematics, chapter Linear independence. Springer (2001)

  12. Fang W-P (2010) Multi-layer secret image sharing. In: 6th International conference on intelligent information hiding and multimedia signal processing (IIH-MSP). IEEE, pp 59–61

  13. Feldman P (1987) A practical scheme for non-interactive verifiable secret sharing. In: 28th Annual symposium on foundations of computer science, 1987. IEEE, pp 427–438

  14. Grassberger P, Procaccia I (1983) Measuring the strangeness of strange attractors. Phys Nonlinear Phenom 9(1):189–208

    Article  MathSciNet  MATH  Google Scholar 

  15. Hsieh S-L, Tsai I-J, Yeh C-P, Chang C-M (2011) An image authentication scheme based on digital watermarking and image secret sharing. Multimed Tools Appl 52(2–3):597–619

    Article  Google Scholar 

  16. Hu C, Liao X, Xiao D (2012) Secret image sharing based on chaotic map and chinese remainder theorem. Int J Wavelets Multiresolution Inf Process 10(03)

  17. Huang H-C, Chu S-C, Pan J-S, Huang C-Y, Liao B-Y (2011) Tabu search based multi-watermarks embedding algorithm with multiple description coding. Inf Sci 181(16):3379–3396

    Article  Google Scholar 

  18. Jia X (2010) Image encryption using the ikeda map. In: International conference on intelligent computing and cognitive informatics (ICICCI). IEEE, pp 455–458

  19. Korzhik V, Morales-Luna G, Nebaeva K (2012) The capacity of a stegosystem for the noisy attack channel. Journal of Information Hiding and Multimedia Signal Processing. Ubiquit Int 3(2):205–211

    Google Scholar 

  20. Lang J (2012) A no-key-exchange secure image sharing scheme based on shamir’s three-pass cryptography protocol and the multiple-parameter fractional fourier transform. Opt Express 20(3):2386–2398

    Article  Google Scholar 

  21. Lin Y-Y, Ran-Zan Wang (2010) Scalable secret image sharing with smaller shadow images. IEEE Signal Process Lett 17(3):316–319

    Article  Google Scholar 

  22. Liangrui T, Jing L, Yi S (2009) Image encryption based on a four-dimensional chaotic system. In: 5th International conference on natural computation, 2009, ICNC’09, vol 5. IEEE, pp 487–491

  23. Malik S, Sardana A, Jaya J (2012) A keyless approach to image encryption. In: International conference on communication systems and network technologies (CSNT). IEEE, pp 879–883

  24. Pan J-S, Hsin Y-C, Huang H-C, Huang K-C (2004) Robust image watermarking based on multiple description vector quantisation. Electron Lett 40(22):1409–1410

    Article  Google Scholar 

  25. Poonkuntran S, Rajesh RS (2014) Chaotic model based semi fragile watermarking using integer transforms for digital fundus image authentication. Multimed Tools Appl 68(1):79–93

    Article  Google Scholar 

  26. Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613

    Article  MathSciNet  MATH  Google Scholar 

  27. Shi R, Zhong H, Huang L, Yonglong L (2008) A (t, n) secret sharing scheme for image encryption. In: Congress on image and signal processing, 2008, CISP’08, vol. 3. IEEE, pp 3–6

  28. Thien C-C, Lin J-C (2002) Secret image sharing. Comput Graph 26(5):765–770

    Article  Google Scholar 

  29. Wang R-Z, Shyu S-J (2007) Scalable secret image sharing. Signal Process Image Commun 22(4):363–373

    Article  Google Scholar 

  30. Xu E, Shao L, Cao G, Ren Y, Qu T (2009) A new method of information encryption. In: ISECS International colloquium on computing, communication, control, and management, CCCM 2009, vol 4. IEEE, pp 583–586

  31. Yang C-HT, Huang Y-H, Syue J-H (2011) Reversible secret image sharing based on shamir’s scheme with discrete haar wavelet transform. In: International conference on electrical and control engineering (ICECE). IEEE, pp 1250–1253

  32. Zanin G, Mei A, Mancini LV (2006) A secure and efficient large scale distributed system for data sharing. In: 26th IEEE International conference on distributed computing systems, ICDCS 2006, pp 27–27

  33. Zhang Y-B, Wang D (2009) An image encryption and sharing algorithm based on chaos and indeterminate equation. In: International conference on computational intelligence and software engineering, CiSE 2009, pp 1–4

  34. Zhu W, Shen Y (2010) Encryption algorithms using chaos and cat methodology. In: International conference on anti-counterfeiting security and identification in communication (ASID). IEEE, pp 20–23

  35. Zhu H, Liu T, Zhu D, Li H (2013) Robust and simple n-party entangled authentication cloud storage protocol based on secret sharing scheme. J Inf Hiding Multimed Signal Process 4(2):110–117

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Hazem Al-Najjar or Pradeep K. Atrey.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Al-Najjar, H., Alharthi, S. & Atrey, P.K. Secure image sharing method over unsecured channels. Multimed Tools Appl 75, 2249–2274 (2016). https://doi.org/10.1007/s11042-014-2404-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-014-2404-5

Keywords