Skip to main content
Log in

Improved multiple secret sharing using generalized chaotic image scrambling

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper presents a new technique on (n, n)-Multiple Secret Sharing (MSS) of color images. In this task, n shared images are generated from n secret images, while n recovered secret images can be reconstructed from n shared images. The proposed method employs the Chinese Remainder Theorem (CRT) and bitwise eXclusive-OR (XOR) operation for generating a set of shared image from a set of secret images. The proposed method improves the security level of (n, n)- MSS scheme by developing and utilizing the generalized chaotic image scrambling. This image scrambling effectively overcomes the problem on former existing MSS scheme while the number of secret images is odd number. As documented in experimental section, the proposed method offers a good result on (n, n)- MSS task. At the same time, the proposed method outperforms the former exising schemes in the MSS field.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Ansari IA, Pant M (July 2017) Multipurpose image watermarking in the domain of DWT based on SVD and ABC. Pattern Recogn Lett 94:228–236

    Article  Google Scholar 

  2. Bharti SS, Gupta M, Agarwal S (2018) A novel approach for verifiable (n,n) audio secret sharing scheme. Multimedia Tools and Applications

  3. Bhattacharjee T, Maity SP, Islam SR (2018) Hierarchical secret image sharing scheme in compressed sensing. Signal Process Image Commun 61:21–32

    Article  Google Scholar 

  4. Chen TH, Wu CS (2011) Efficient multi-secret image sharing based on Boolean operations. Signal Process 91(1):90–97

    Article  MATH  Google Scholar 

  5. Chen C-C, Wu W-J (2014) A secure Boolean-based multi-secret image sharing scheme. J Syst Softw 92:107–114

    Article  Google Scholar 

  6. Deshmukh M, Nain N, Ahmed M (2017) A novel approach for sharing multiple color images by employing Chinese Remainder Theorem. J Vis Commun Image Represent 49:291–302

    Article  Google Scholar 

  7. Feng J-B, Wu H-C, Tsai C-S, Chu Y-P (2005) A new multi-secret images sharing scheme using Largrange’s interpolation. J Syst Softw 76(3):327–339

    Article  Google Scholar 

  8. Gandomi AH, Yang XS, Talatahari S, Alavi AH (2013) Firefly algorithm with chaos. Commun Nonlinear Sci Numer Simul 18:89–98

    Article  MathSciNet  MATH  Google Scholar 

  9. Ghebleh M, Kanso A (2017) A novel secret image sharing scheme using large primes. Multimedia Tools and Applications:1–21

  10. Guo J-M, Prasetyo H (2014) False-positive-free SVD-based image watermarking. J Vis Commun Image Represent 25:1149–1163

    Article  Google Scholar 

  11. Guo C, Chang C-C, Qin C (2012) A multi-threshold secret image sharing scheme based on MSP. Pattern Recogn Lett 33(12):1594–1600

    Article  Google Scholar 

  12. Guo C, Zhang H, Song Q, Li M (2016) A multi-threshold secret image sharing scheme based on the generalized Chinese reminder theorem. Multimedia Tools and Applications 75(8):11577–11594

    Article  Google Scholar 

  13. Guo C, Zhang H, Fu Z, Feng B, Li M (2017) A novel proactive secret image sharing scheme based on LISS. Multimedia Tools and Applications:1–22

  14. Harjito B, Prasetyo H (2016) False-positive-free GSVD-based image watermarking for copyright protection. International Symposium on Electronics and Smart Devices 143–147

  15. Hsia C-H (2015) Improved depth image-based rendering using an adaptive compensation method on an autostereoscopic 3-D display for a Kinect sensor. IEEE Sensors J 15(2):994–1002

    Article  MathSciNet  Google Scholar 

  16. Hsia C-H (2018) New verification method for finger-vein recognition system. IEEE Sensors J 18(2):790–797

    Article  Google Scholar 

  17. Khelifi F (2018) On the security of a stream cipher in reversible data hiding schemes operating in the encrypted domain. Signal Process 143:336–345

    Article  Google Scholar 

  18. Liu Z, Pun C (2018) Reversible data-hiding in encrypted images by redundant space transfer. Inf Sci 433–434:188–203

    Article  MathSciNet  Google Scholar 

  19. Liu Y, Tang S, Liu R, Zhang L, Ma Z (2018) Secure and robust digital image watermarking scheme using logistic and RSA encryption. Expert Syst Appl 97:95–105

    Article  Google Scholar 

  20. Liu YN, Zhong Q, Xie M, Chen ZB (2018) A novel multiple-level secret image sharing scheme. Multimedia Tools and Applications 77(5):6017–6031

    Article  Google Scholar 

  21. Mahato S, Yadav DK, Khan DA (2017) A minesweeper game-based steganography scheme. Journal of Information Security and Applications 32:1–14

    Article  Google Scholar 

  22. Ni Z, Ma L, Zeng HQ, Chen J, Cai C, Ma K-K (2017) ESIM: Edge Similarity for Screen Content Image Quality Assessment. IEEE Trans Image Process 26(10):4818–4831

    Article  MathSciNet  Google Scholar 

  23. Sajedi H (2016) Steganalysis based on steganography pattern discovery. Journal of Information Security and Applications 30:3–14

    Article  Google Scholar 

  24. The TH, Hua C, Tu NA, Hur T, Kim D, Amin MB, Kang BH, Seung H, Lee S (2018) Selective bit embedding scheme for robust blind color image watermarking. Inf Sci 426:1–18

    Article  Google Scholar 

  25. Wang C, Wang H, Ji Y (2018) Multi-bit wavelength coding phase-shift-keying optical steganography based on amplified spontaneous emission noise. Opt Commun 407:1–8

    Article  Google Scholar 

  26. Wu X, Weng J, Yan W (2018) Adopting secret sharing for reversible data hiding in encrypted images. Signal Process 143:269–281

    Article  Google Scholar 

  27. Xing L, Zeng H, Chen J, Zhu J, Hou J (2018) A multi-scale contrast-based image quality assessment model for multi-exposure image fusion. Signal Process 145:233–240

    Article  Google Scholar 

  28. Yang CN, Chen CH, Cai SR (2016) Enhanced Boolean-based multi secret image sharing scheme. J Syst Softw 116:22–34

    Article  Google Scholar 

  29. Ye G (2010) Image scrambling encryption algorithm of pixel bit based on chaos map. Pattern Recogn Lett 31:347–354

    Article  Google Scholar 

  30. Zarepour-Ahmadabadi J, Shiri-Ahmadabadi M, Latif A (2018) A cellular automata-based multi-stage secret image sharing scheme. Multimedia Tools and Applications:1–24

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chih-Hsien Hsia.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Heri Prasetyo, Chih-Hsien Hsia Improved multiple secret sharing using generalized chaotic image scrambling. Multimed Tools Appl 78, 29089–29120 (2019). https://doi.org/10.1007/s11042-018-6304-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-6304-y

Keywords

Navigation