K out of N Secret Sharing Scheme for Multiple Color Images with Steganography and Authentication

With our lives trundling toward a fully-digital ecosystem in break-neck speed, today’s encryption and cryptography are facing the challenge of ensuring security and future-readiness of our transactions. When such transactions involve multiple hands, transmission of such data in discrete and recoverable parts (secret shares) guarantees confidentiality. This paper’s objective is to present a foolproof way of multiple secret sharing, eliminating issues such as half-toning and degradation of visual quality of the recovered images. This k out of n steganography and authenticated image sharing (SAIS) scheme for multiple color images generates n relevant shares with the ability to reconstruct the secret images using k shares and facility to find out any move for appropriation of share cover images. The key aspects of this proposed scheme is to use simple Boolean and arithmetic operations with reduction of computational complexity from O(nlog2n) to O(n) and to share multiple images without any pixel expansion.

[1]  Chien-Chang Chen,et al.  A secure Boolean-based multi-secret image sharing scheme , 2014, J. Syst. Softw..

[2]  Pei-Ling Chiu,et al.  A novel visual secret sharing scheme for multiple secrets without pixel expansion , 2010, Expert Syst. Appl..

[3]  Tung-Shou Chen,et al.  New visual cryptography system based on circular shadow image and fixed angle segmentation , 2005, J. Electronic Imaging.

[4]  Chang-Chou Lin,et al.  Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..

[5]  Ja-Chen Lin,et al.  Secret image sharing , 2002, Comput. Graph..

[6]  Ching-Nung Yang,et al.  Improvements of image sharing with steganography and authentication , 2007, J. Syst. Softw..

[7]  P. Mohamed Fathimal,et al.  Bidirectional Serpentine Scan Based Error Diffusion Technique for Color Image Visual Cryptography , 2014 .

[8]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[9]  Chin-Chen Chang,et al.  Sharing secrets in stego images with authentication , 2008, Pattern Recognit..

[10]  P. Mohamed Fathimal,et al.  K Out of N Secret Sharing Scheme with Steganography and Authentication , 2016 .

[11]  Ching-Nung Yang,et al.  Steganography and authentication in image sharing without parity bits , 2012 .

[12]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[13]  Ziba Eslami,et al.  Secret image sharing based on cellular automata and steganography , 2010, Pattern Recognit..

[14]  P. Mohamed Fathimala,et al.  K out of N secret sharing scheme for gray and color images , 2015, 2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT).

[15]  Jen-Bang Feng,et al.  Visual secret sharing for multiple secrets , 2008, Pattern Recognit..

[16]  Ran-Zan Wang,et al.  Sharing multiple secrets in visual cryptography , 2007, Pattern Recognit..

[17]  Ja-Chen Lin,et al.  Flip visual cryptography (FVC) with perfect security, conditionally-optimal contrast, and no expansion , 2010, J. Vis. Commun. Image Represent..

[18]  Mohamed Fathimal (N, N) Secret Color Image Sharing Scheme with Dynamic Group , 2015 .

[19]  Chin-Chen Chang,et al.  A novel (n, t, n) secret image sharing scheme without a trusted third party , 2013, Multimedia Tools and Applications.

[20]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[21]  P MohamedFathimal.,et al.  (N, N) Secret Color Image Sharing Scheme with Dynamic Group , 2015 .