Abstract
Image sharing has become a prominent field in large and small networks. However, in order to deliver the shares to their respective shareholders, we need a secure channel to protect the shares from potential attacks by other users on the network. These users can locate the shares and retrieve the image using the Lagrange interpolation method if they are able to locate the minimum required number of shares. This paper proposes a method to protect the privacy and security of the shares when sending them through unsecured channels. The proposed method is divided into three phases. In the first phase, image pixels are changed using the column and row indices, then the shares are created using Shamir’s secret sharing (SSS) method. Then a relationship is created between the shares using a linear independence function. In the second phase, the first part of the image is encrypted to hide the solver data. Finally, in the third phase, the data is shared using the SSS method. Participants can retrieve the whole image by applying the reverse order of the proposed method using only the information from the sender through the same channel. The simulation results show that the proposed method is efficient and robust against different types of attacks and can be used to send the shares over unsecured channels.
Similar content being viewed by others
References
Alharthi S, Atrey PK (2010) Further improvements on secret image sharing scheme. In: Proceedings of the 2nd workshop on Multimedia in forensics, security and intelligence. ACM, pp 53–58
Atrey PK, Alharthi S, Anwar Hossain M, AlGhamdi A, El Saadik A (2013) Collective control over sensitive video data using secret sharing. Multimed Tools Appl. doi:10.1007/s11042-013-1644-0.
Blakley GR (1899) Safeguarding cryptographic keys. In: International workshop on managing requirements knowledge. IEEE Computer Society, p 313
Chang C-C, Lin P-Y, Wang ZH, Li MC (2010) A sudoku-based secret image sharing scheme with reversibility. J Commun 5(1):5–12
Chen LS-T, Su W-K, Lin J-C (2009) Secret image sharing based on vector quantization. Int J Circ Syst Signal Process 3:137–144
Cao Y-y, Fu C (2008) An image encryption scheme based on high dimension chaos system. In: International conference on intelligent computation technology and automation (ICICTA), vol 2. IEEE, pp 104–108
Chen Y-H, Huang H-C Coevolutionary genetic watermarking for owner identification. Neural Comput Applic 1–8
Delei J, Sen B, Wenming D (2008) An image encryption algorithm based on knight’s tour and slip encryption-filter. In: International conference on computer science and software engineering, vol 1. IEEE, pp 251–255
Devaki P, Raghavendra Rao G (2012) Lossless reconstruction of secret image using threshold secret sharing and transformation. Int J Netw Secur Appl 4(3)
Dong L, Wang D, Ku M, Dai Y (2010) (2, n) secret image sharing scheme with ideal contrast. In: International conference on computational intelligence and security (CIS). IEEE, pp 421–424
Encyclopedia of Mathematics, chapter Linear independence. Springer (2001)
Fang W-P (2010) Multi-layer secret image sharing. In: 6th International conference on intelligent information hiding and multimedia signal processing (IIH-MSP). IEEE, pp 59–61
Feldman P (1987) A practical scheme for non-interactive verifiable secret sharing. In: 28th Annual symposium on foundations of computer science, 1987. IEEE, pp 427–438
Grassberger P, Procaccia I (1983) Measuring the strangeness of strange attractors. Phys Nonlinear Phenom 9(1):189–208
Hsieh S-L, Tsai I-J, Yeh C-P, Chang C-M (2011) An image authentication scheme based on digital watermarking and image secret sharing. Multimed Tools Appl 52(2–3):597–619
Hu C, Liao X, Xiao D (2012) Secret image sharing based on chaotic map and chinese remainder theorem. Int J Wavelets Multiresolution Inf Process 10(03)
Huang H-C, Chu S-C, Pan J-S, Huang C-Y, Liao B-Y (2011) Tabu search based multi-watermarks embedding algorithm with multiple description coding. Inf Sci 181(16):3379–3396
Jia X (2010) Image encryption using the ikeda map. In: International conference on intelligent computing and cognitive informatics (ICICCI). IEEE, pp 455–458
Korzhik V, Morales-Luna G, Nebaeva K (2012) The capacity of a stegosystem for the noisy attack channel. Journal of Information Hiding and Multimedia Signal Processing. Ubiquit Int 3(2):205–211
Lang J (2012) A no-key-exchange secure image sharing scheme based on shamir’s three-pass cryptography protocol and the multiple-parameter fractional fourier transform. Opt Express 20(3):2386–2398
Lin Y-Y, Ran-Zan Wang (2010) Scalable secret image sharing with smaller shadow images. IEEE Signal Process Lett 17(3):316–319
Liangrui T, Jing L, Yi S (2009) Image encryption based on a four-dimensional chaotic system. In: 5th International conference on natural computation, 2009, ICNC’09, vol 5. IEEE, pp 487–491
Malik S, Sardana A, Jaya J (2012) A keyless approach to image encryption. In: International conference on communication systems and network technologies (CSNT). IEEE, pp 879–883
Pan J-S, Hsin Y-C, Huang H-C, Huang K-C (2004) Robust image watermarking based on multiple description vector quantisation. Electron Lett 40(22):1409–1410
Poonkuntran S, Rajesh RS (2014) Chaotic model based semi fragile watermarking using integer transforms for digital fundus image authentication. Multimed Tools Appl 68(1):79–93
Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613
Shi R, Zhong H, Huang L, Yonglong L (2008) A (t, n) secret sharing scheme for image encryption. In: Congress on image and signal processing, 2008, CISP’08, vol. 3. IEEE, pp 3–6
Thien C-C, Lin J-C (2002) Secret image sharing. Comput Graph 26(5):765–770
Wang R-Z, Shyu S-J (2007) Scalable secret image sharing. Signal Process Image Commun 22(4):363–373
Xu E, Shao L, Cao G, Ren Y, Qu T (2009) A new method of information encryption. In: ISECS International colloquium on computing, communication, control, and management, CCCM 2009, vol 4. IEEE, pp 583–586
Yang C-HT, Huang Y-H, Syue J-H (2011) Reversible secret image sharing based on shamir’s scheme with discrete haar wavelet transform. In: International conference on electrical and control engineering (ICECE). IEEE, pp 1250–1253
Zanin G, Mei A, Mancini LV (2006) A secure and efficient large scale distributed system for data sharing. In: 26th IEEE International conference on distributed computing systems, ICDCS 2006, pp 27–27
Zhang Y-B, Wang D (2009) An image encryption and sharing algorithm based on chaos and indeterminate equation. In: International conference on computational intelligence and software engineering, CiSE 2009, pp 1–4
Zhu W, Shen Y (2010) Encryption algorithms using chaos and cat methodology. In: International conference on anti-counterfeiting security and identification in communication (ASID). IEEE, pp 20–23
Zhu H, Liu T, Zhu D, Li H (2013) Robust and simple n-party entangled authentication cloud storage protocol based on secret sharing scheme. J Inf Hiding Multimed Signal Process 4(2):110–117
Author information
Authors and Affiliations
Corresponding authors
Rights and permissions
About this article
Cite this article
Al-Najjar, H., Alharthi, S. & Atrey, P.K. Secure image sharing method over unsecured channels. Multimed Tools Appl 75, 2249–2274 (2016). https://doi.org/10.1007/s11042-014-2404-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-014-2404-5