Abstract
This paper presents a new technique on (n, n)-Multiple Secret Sharing (MSS) of color images. In this task, n shared images are generated from n secret images, while n recovered secret images can be reconstructed from n shared images. The proposed method employs the Chinese Remainder Theorem (CRT) and bitwise eXclusive-OR (XOR) operation for generating a set of shared image from a set of secret images. The proposed method improves the security level of (n, n)- MSS scheme by developing and utilizing the generalized chaotic image scrambling. This image scrambling effectively overcomes the problem on former existing MSS scheme while the number of secret images is odd number. As documented in experimental section, the proposed method offers a good result on (n, n)- MSS task. At the same time, the proposed method outperforms the former exising schemes in the MSS field.
Similar content being viewed by others
References
Ansari IA, Pant M (July 2017) Multipurpose image watermarking in the domain of DWT based on SVD and ABC. Pattern Recogn Lett 94:228–236
Bharti SS, Gupta M, Agarwal S (2018) A novel approach for verifiable (n,n) audio secret sharing scheme. Multimedia Tools and Applications
Bhattacharjee T, Maity SP, Islam SR (2018) Hierarchical secret image sharing scheme in compressed sensing. Signal Process Image Commun 61:21–32
Chen TH, Wu CS (2011) Efficient multi-secret image sharing based on Boolean operations. Signal Process 91(1):90–97
Chen C-C, Wu W-J (2014) A secure Boolean-based multi-secret image sharing scheme. J Syst Softw 92:107–114
Deshmukh M, Nain N, Ahmed M (2017) A novel approach for sharing multiple color images by employing Chinese Remainder Theorem. J Vis Commun Image Represent 49:291–302
Feng J-B, Wu H-C, Tsai C-S, Chu Y-P (2005) A new multi-secret images sharing scheme using Largrange’s interpolation. J Syst Softw 76(3):327–339
Gandomi AH, Yang XS, Talatahari S, Alavi AH (2013) Firefly algorithm with chaos. Commun Nonlinear Sci Numer Simul 18:89–98
Ghebleh M, Kanso A (2017) A novel secret image sharing scheme using large primes. Multimedia Tools and Applications:1–21
Guo J-M, Prasetyo H (2014) False-positive-free SVD-based image watermarking. J Vis Commun Image Represent 25:1149–1163
Guo C, Chang C-C, Qin C (2012) A multi-threshold secret image sharing scheme based on MSP. Pattern Recogn Lett 33(12):1594–1600
Guo C, Zhang H, Song Q, Li M (2016) A multi-threshold secret image sharing scheme based on the generalized Chinese reminder theorem. Multimedia Tools and Applications 75(8):11577–11594
Guo C, Zhang H, Fu Z, Feng B, Li M (2017) A novel proactive secret image sharing scheme based on LISS. Multimedia Tools and Applications:1–22
Harjito B, Prasetyo H (2016) False-positive-free GSVD-based image watermarking for copyright protection. International Symposium on Electronics and Smart Devices 143–147
Hsia C-H (2015) Improved depth image-based rendering using an adaptive compensation method on an autostereoscopic 3-D display for a Kinect sensor. IEEE Sensors J 15(2):994–1002
Hsia C-H (2018) New verification method for finger-vein recognition system. IEEE Sensors J 18(2):790–797
Khelifi F (2018) On the security of a stream cipher in reversible data hiding schemes operating in the encrypted domain. Signal Process 143:336–345
Liu Z, Pun C (2018) Reversible data-hiding in encrypted images by redundant space transfer. Inf Sci 433–434:188–203
Liu Y, Tang S, Liu R, Zhang L, Ma Z (2018) Secure and robust digital image watermarking scheme using logistic and RSA encryption. Expert Syst Appl 97:95–105
Liu YN, Zhong Q, Xie M, Chen ZB (2018) A novel multiple-level secret image sharing scheme. Multimedia Tools and Applications 77(5):6017–6031
Mahato S, Yadav DK, Khan DA (2017) A minesweeper game-based steganography scheme. Journal of Information Security and Applications 32:1–14
Ni Z, Ma L, Zeng HQ, Chen J, Cai C, Ma K-K (2017) ESIM: Edge Similarity for Screen Content Image Quality Assessment. IEEE Trans Image Process 26(10):4818–4831
Sajedi H (2016) Steganalysis based on steganography pattern discovery. Journal of Information Security and Applications 30:3–14
The TH, Hua C, Tu NA, Hur T, Kim D, Amin MB, Kang BH, Seung H, Lee S (2018) Selective bit embedding scheme for robust blind color image watermarking. Inf Sci 426:1–18
Wang C, Wang H, Ji Y (2018) Multi-bit wavelength coding phase-shift-keying optical steganography based on amplified spontaneous emission noise. Opt Commun 407:1–8
Wu X, Weng J, Yan W (2018) Adopting secret sharing for reversible data hiding in encrypted images. Signal Process 143:269–281
Xing L, Zeng H, Chen J, Zhu J, Hou J (2018) A multi-scale contrast-based image quality assessment model for multi-exposure image fusion. Signal Process 145:233–240
Yang CN, Chen CH, Cai SR (2016) Enhanced Boolean-based multi secret image sharing scheme. J Syst Softw 116:22–34
Ye G (2010) Image scrambling encryption algorithm of pixel bit based on chaos map. Pattern Recogn Lett 31:347–354
Zarepour-Ahmadabadi J, Shiri-Ahmadabadi M, Latif A (2018) A cellular automata-based multi-stage secret image sharing scheme. Multimedia Tools and Applications:1–24
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Heri Prasetyo, Chih-Hsien Hsia Improved multiple secret sharing using generalized chaotic image scrambling. Multimed Tools Appl 78, 29089–29120 (2019). https://doi.org/10.1007/s11042-018-6304-y
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-018-6304-y