A novel approach for sharing multiple color images by employing Chinese Remainder Theorem

Abstract Conventional approaches for encryption are unsuitable for simultaneously achieving reliability and confidentiality. Threshold-based secret sharing scheme deals with the problem of sharing a secret information into a group of n users and secret can be recovered only when a sufficient users come together, we can reconstruct a secret information from t, where t n . There is a requirement to evolve a secure secret sharing scheme so that the reconstruction is possible only when all shares are available. In this paper, we propose a secure ( n , n ) -Multi Secret Sharing (MSS) scheme using Chinese Remainder Theorem (CRT). The proposed scheme shares secret information among n users and for recovery all n users are needed, if one of the user is absent then we could not reconstruct the secret information. The proposed scheme does not reveals the partial secret information, as the randomness in shares is more. The proposed scheme outperforms the existing techniques in terms of randomness and security.

[1]  Jen-Bang Feng,et al.  A new multi-secret images sharing scheme using Largrange's interpolation , 2005, J. Syst. Softw..

[2]  Mingwu Zhang,et al.  Realizing secret sharing with general access structure , 2016, Inf. Sci..

[3]  Chin-Chen Chang,et al.  Lossless and unlimited multi-image sharing based on Chinese remainder theorem and Lagrange interpolation , 2014, Signal Process..

[4]  Chien-Chang Chen,et al.  A secure Boolean-based multi-secret image sharing scheme , 2014, J. Syst. Softw..

[5]  Soni Choudhary,et al.  Secure Data Outsourcing in the Cloud Using Multi-secret Sharing Scheme (MSSS) , 2017 .

[6]  Neeta Nain,et al.  Enhanced Modulo Based Multi Secret Image Sharing Scheme , 2016, ICISS.

[7]  Chien-Chang Chen,et al.  A new Boolean-based multiple secret image sharing scheme to share different sized secret images , 2017, J. Inf. Secur. Appl..

[8]  Neeta Nain,et al.  A Novel Approach of an (n, n) Multi-Secret Image Sharing Scheme Using Additive Modulo , 2016, CVIP.

[9]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[10]  V. P. Binu,et al.  Secure and Efficient Secret Sharing Scheme with General Access Structures Based on Elliptic Curve and Pairing , 2017, Wirel. Pers. Commun..

[11]  Behrouz A. Forouzan,et al.  Cryptography and network security , 1998 .

[12]  Neeta Nain,et al.  Efficient and secure multi secret sharing schemes based on boolean XOR and arithmetic modulo , 2016, Multimedia Tools and Applications.

[13]  Maroti Deshmukh,et al.  A Technique to Share Multiple Secret Images , 2016, ArXiv.

[14]  Engin Avci,et al.  A reversible data hiding algorithm based on probabilistic DNA-XOR secret sharing scheme for color images , 2016, Displays.

[15]  John Bloom,et al.  A modular approach to key safeguarding , 1983, IEEE Trans. Inf. Theory.

[16]  Neeta Nain,et al.  An (n, n)-Multi Secret Image Sharing Scheme Using Boolean XOR and Modular Arithmetic , 2016, 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA).

[17]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[18]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[19]  Yanjun Liu,et al.  Distortion-free secret image sharing method with two meaningful shadows , 2016, IET Image Process..

[20]  Chin-Chen Chang,et al.  A multi-threshold secret image sharing scheme based on MSP , 2012, Pattern Recognit. Lett..

[21]  Her-Chang Chao,et al.  XOR-based progressive visual secret sharing using generalized random grids , 2017, Displays.

[22]  Mingchu Li,et al.  A multi-threshold secret image sharing scheme based on the generalized Chinese reminder theorem , 2015, Multimedia Tools and Applications.

[23]  V. Ch. Venkaiah,et al.  Multi-Stage Multi-Secret Sharing Schemes Based on Chinese Remainder Theorem , 2015, ICARCSET '15.

[24]  Suneeta Agarwal,et al.  XOR based continuous-tone multi secret sharing for store-and-forward telemedicine , 2016, Multimedia Tools and Applications.

[25]  Maurice Mignotte,et al.  How to Share a Secret? , 1982, EUROCRYPT.

[26]  Ching-Nung Yang,et al.  Enhanced Boolean-based multi secret image sharing scheme , 2016, J. Syst. Softw..

[27]  Tzungher Chen,et al.  Efficient multi-secret image sharing based on Boolean operations , 2011, Signal Process..

[28]  William Stallings,et al.  Cryptography and network security , 1998 .

[29]  Aggelos Kiayias,et al.  Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online) , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).

[30]  Giovanni Di Crescenzo,et al.  Multi-Secret Sharing Schemes , 1994, CRYPTO.

[31]  Mingchu Li,et al.  (t, n) Threshold secret image sharing scheme with adversary structure , 2016, Multimedia Tools and Applications.

[32]  Chakravarthy Bhagvati,et al.  CRT Based Threshold Multi Secret Sharing Scheme , 2014, Int. J. Netw. Secur..

[33]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.