Hierarchical threshold secret sharing scheme for color images

The applications that use pattern recognition via secret sharing are seldom linear, straightforward and uncomplicated. The layers of complexity grows as the process turns more secretive. In applications, such as banking transactions, hierarchical secret sharing comes in as a handy tool. This paper analyses the use of disjunctive hierarchy of secret sharing without compromising security while saving time. This scheme simplifies the process when more hands are involved by using simple Boolean and arithmetic operations and thus reduces the computational complexity from O (nlog2n) to O (n). The other features are authentication of the participants using Lagrange Interpolation; non-requirement of half toning of color images; no pixel expansion without degradation in visual quality of the recovered secret image. This paper also provides solution for meaningful share images with the ability to detect the manipulation of share images. The main advantage of this scheme is that it gives the benefit in scenarios in which participants of different levels are involved.

[1]  P. Mohamed Fathimal,et al.  K out of N Secret Sharing Scheme for Multiple Color Images with Steganography and Authentication , 2016, Int. J. Image Graph..

[2]  Mohamed Fathimal (N, N) Secret Color Image Sharing Scheme with Dynamic Group , 2015 .

[3]  P. Mohamed Fathimal,et al.  Bidirectional Serpentine Scan Based Error Diffusion Technique for Color Image Visual Cryptography , 2014 .

[4]  Ernest F. Brickell,et al.  Some Ideal Secret Sharing Schemes , 1990, EUROCRYPT.

[5]  G. R. Blakley,et al.  Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[6]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[7]  Tamir Tassa,et al.  Hierarchical Threshold Secret Sharing , 2004, Journal of Cryptology.

[8]  Ching-Nung Yang,et al.  Steganography and authentication in image sharing without parity bits , 2012 .

[9]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[10]  Chin-Chen Chang,et al.  Sharing secrets in stego images with authentication , 2008, Pattern Recognit..

[11]  Ernest F. Brickell,et al.  On the classification of ideal secret sharing schemes , 1989, Journal of Cryptology.

[12]  Ziba Eslami,et al.  Secret image sharing based on cellular automata and steganography , 2010, Pattern Recognit..

[13]  P. Mohamed Fathimala,et al.  K out of N secret sharing scheme for gray and color images , 2015, 2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT).

[14]  Chin-Chen Chang,et al.  A hierarchical threshold secret image sharing , 2012, Pattern Recognit. Lett..

[15]  Nira Dyn,et al.  Multipartite Secret Sharing by Bivariate Interpolation , 2006, ICALP.

[16]  Gustavus J. Simmons,et al.  How to (Really) Share a Secret , 1988, CRYPTO.