Efficient collusion resistant multi-secret image sharing
- PDF / 4,060,775 Bytes
- 20 Pages / 439.37 x 666.142 pts Page_size
- 79 Downloads / 204 Views
Efficient collusion resistant multi-secret image sharing Kapil Mishra 1
1
1
& Sannihith Kavala & Satish Kr. Singh & P. Nagabhushan
1
Received: 14 December 2019 / Revised: 2 July 2020 / Accepted: 12 August 2020 # Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract
Multi-secret image sharing techniques (MSS) extend the secret image sharing schemes. The paper reports a novel MSS scheme designed to be collusion resistant. It starts with a brief introduction of the concept thereafter discussing the related works in the domain. Security is an implicit requirement for MSS techniques. There should be no possibility of collusion among the shareholders. No less than k shareholders for (k, n) MSS scheme should be having even a slight view of the secret from their shares, n being the total number of shareholders. The paper reviews and highlights the security issues like possibility of collusion, randomness issues or robustness against tampering attack in the state-of-the-art works. It proposes a new (n, n) MSS scheme in order to rectify the issues. The algorithm encrypts N different secret images to generate N noisy share images. It resolves the existing problems in a secure, and time efficient manner. A range of experiments specifically time complexity, noise, tampering, collusion and histogram analysis are performed for rigorous security analysis. The results, thus obtained indicated that the algorithm is efficient and preserves the security requirements in a much better way than the existing MSS schemes. Keywords Multi-secret image sharing . Secret sharing . Visual cryptography . Multimedia security
* Kapil Mishra [email protected] Sannihith Kavala [email protected] Satish Kr. Singh [email protected] P. Nagabhushan [email protected]
1
Department of Information Technology, Indian Institute of Information Technology, Allahabad, Prayagraj, India
Multimedia Tools and Applications
1 Introduction Digital images form a large part of the multimedia data communicated over internet or other networking scenarios. Security of digital images hence is a major issue. While there are many techniques like watermarking, steganography, and image encryption to ensure security in one or other way. Information security is most commonly described using CIA triad. The CIA triad refers to the core security objectives namely confidentiality, integrity and availability. This paper is focused upon preserving confidentiality of a secret image(s). Image encryption, steganography and secret image sharing are the techniques that work in different ways for preserving the confidentiality of an image. Among these techniques, secret image sharing has recently evolved in the domain of image security. The research in this area is known to have been evolved from a Visual Secret sharing (VSS) scheme proposed by Shamir [23] in 1995 [31]. Visual Secret Sharing techniques split the visual secret information into shares that can be decrypted by human vision system without any cryptographic computational over
Data Loading...