Improvement of (n, n)-multi-secret image sharing schemes based on Boolean operations

Abstract In a (n, n)-secret image sharing scheme, a secret image is distributed among n parties in such a way that cooperation of all the shares is needed for reconstruction of the original secret image. Moreover, in these schemes, we have the security requirement which states that fewer than n shares should not reveal any information about the secret. Recently, three efficient (n, n)-multi-secret image sharing schemes based on Boolean operations are proposed. The goal of this paper is to prove that these schemes don’t satisfy the threshold security, i.e., with knowledge of ( n − 1 ) or fewer shares, considerable information about the secret image can be obtained using efficient computations. We further propose an improvement which successfully overcomes the reported security flaw. We show that the improved scheme generates pseudo-random shares and outperforms the recent secure Boolean-based schemes in computational cost.

[1]  Gwoboa Horng,et al.  A new authentication based cheating prevention scheme in Naor-Shamir's visual cryptography , 2012, J. Vis. Commun. Image Represent..

[2]  Chien-Chang Chen,et al.  A new Boolean-based multiple secret image sharing scheme to share different sized secret images , 2017, J. Inf. Secur. Appl..

[3]  Himanshu S. Mazumdar,et al.  Universal Share for Multisecret Image Sharing Scheme Based on Boolean Operation , 2016, IEEE Signal Processing Letters.

[4]  Peng Li,et al.  A construction method of (t, k, n)-essential secret image sharing scheme , 2018, Signal Process. Image Commun..

[5]  Arun Kumar Sangaiah,et al.  Medical JPEG image steganography based on preserving inter-block dependencies , 2017, Comput. Electr. Eng..

[6]  Ziba Eslami,et al.  A (t, n)-multi secret image sharing scheme based on Boolean operations , 2018, J. Vis. Commun. Image Represent..

[7]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[8]  Alfredo De Santis,et al.  Extended capabilities for visual cryptography , 2001, Theor. Comput. Sci..

[9]  Tzungher Chen,et al.  Efficient multi-secret image sharing based on Boolean operations , 2011, Signal Process..

[10]  Chien-Chang Chen,et al.  Highly efficient and secure multi-secret image sharing scheme , 2015, Multimedia Tools and Applications.

[11]  Ching-Nung Yang,et al.  New Colored Visual Secret Sharing Schemes , 2000, Des. Codes Cryptogr..

[12]  Ching-Nung Yang,et al.  Random grid-based visual secret sharing with multiple decryptions , 2015, J. Vis. Commun. Image Represent..

[13]  Moni Naor,et al.  Visual cryptography for grey level images , 2000, Inf. Process. Lett..

[14]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[15]  Chih-Hung Lin,et al.  Friendly progressive random-grid-based visual secret sharing with adaptive contrast , 2015, J. Vis. Commun. Image Represent..

[16]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[17]  Chien-Chang Chen,et al.  A secure Boolean-based multi-secret image sharing scheme , 2014, J. Syst. Softw..

[18]  Pradeep K. Atrey,et al.  Secret sharing approach for securing cloud-based pre-classification volume ray-casting , 2015, Multimedia Tools and Applications.

[19]  Ali Kanso,et al.  A novel secret image sharing scheme using large primes , 2017, Multimedia Tools and Applications.

[20]  Shaohua Tang,et al.  A secure image sharing scheme with high quality stego-images based on steganography , 2017, Multimedia Tools and Applications.

[21]  Josh Benaloh,et al.  Generalized Secret Sharing and Monotone Functions , 1990, CRYPTO.

[22]  Zheng Qin,et al.  Data embedding in digital images using critical functions , 2017, Signal Process. Image Commun..

[23]  Ching-Nung Yang,et al.  Enhanced Boolean-based multi secret image sharing scheme , 2016, J. Syst. Softw..

[24]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[25]  Shu-jen H. Chang,et al.  SHA-3 Derived Functions: cSHAKE, KMAC, TupleHash, and ParallelHash , 2016 .

[26]  Chang-Chou Lin,et al.  Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..

[27]  Xiaobo Li,et al.  Probabilistic visual secret sharing schemes for grey-scale images and color images , 2007, Inf. Sci..

[28]  Ali Kanso,et al.  An efficient (t,n)–threshold secret image sharing scheme , 2017, Multimedia Tools and Applications.

[29]  Neeta Nain,et al.  A novel approach for sharing multiple color images by employing Chinese Remainder Theorem , 2017, J. Vis. Commun. Image Represent..

[30]  Yvo Desmedt,et al.  Threshold Cryptosystems , 1989, CRYPTO.

[31]  Ja-Chen Lin,et al.  Secret image sharing , 2002, Comput. Graph..

[32]  Ning Ma,et al.  Two secret sharing schemes based on Boolean operations , 2007, Pattern Recognit..

[33]  Arambam Neelima,et al.  A survey paper on secret image sharing schemes , 2018, International Journal of Multimedia Information Retrieval.

[34]  Kamel Mohamed Faraoun,et al.  Design of a new efficient and secure multi-secret images sharing scheme , 2017, Multimedia Tools and Applications.

[35]  Ran-Zan Wang,et al.  Secret image sharing with smaller shadow images , 2006, Pattern Recognit. Lett..