Skip to main content
Log in

Increasing Participants Using Counting-Based Secret Sharing via Involving Matrices and Practical Steganography

  • Research Article-Computer Engineering and Computer Science
  • Published:
Arabian Journal for Science and Engineering Aims and scope Submit manuscript

Abstract

Secret sharing is an approach for accessing sensitive information by several authorized participants. It shares the secret key in different forms among several authorized participants, where a certain number of which is required to retrieve the original secret. This secret sharing raised a new practicality challenge of human secrecy memorization as well as limited number of users allowed, which have been addressed within this work. This paper examines two particular secret sharing techniques known as the counting-based secret sharing and the matrix-based secret sharing, which enhances the former to accommodate a high number of participants. This work aimed to serve participants accommodating the share’s memorization challenge via image steganography as well as testing both schemes in the cases of original 1-bit and 2-bit methods. We compared practicality applying the secret sharing methods combined with two image steganography methods: the least significant bit and the discrete wavelet transform. Our findings included interesting remarks regarding both security and robustness. Our results demonstrated that despite the large number of shares generated, as to serve more participants using the matrix-based scheme, its performance was highly satisfactory. Our experiments illustrated high imperceptibility levels for the matrix-based scheme, which in turn provides higher security and robustness compared to the original method, which provided very few shares serving a limited number of participants.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Kini, N.; Kini, V.; Gautam: A Secured Steganography Algorithm for Hiding an Image in an Image. Studies in Computational Intelligence, Vol. 771, p. 539–546. Springer (2019)

    Google Scholar 

  2. Ogata, W.; Kurosawa, K.; Stinson, D.R.: Optimum secret sharing scheme secure against cheating. SIAM J. Discret. Math. 20(1), 79–95 (2006). https://doi.org/10.1137/S0895480100378689

    Article  MathSciNet  MATH  Google Scholar 

  3. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979). https://doi.org/10.1145/359168.359176

    Article  MathSciNet  MATH  Google Scholar 

  4. Gutub, A.; Al-Juaid, N.; Khan, E.: Counting-based secret sharing technique for multimedia applications. Multimed. Tools Appl. 78(5), 5591–5619 (2019). https://doi.org/10.1007/s11042-017-5293-6

    Article  Google Scholar 

  5. Porwal, S., Mittal, S.: A threshold secret sharing technique based on matrix manipulation. In: AIP Conference on Proceedings, 2214 (2020). https://doi.org/10.1063/5.0003358

  6. Kadhim, I.J.; Premaratne, P.; Vial, P.J.; Halloran, B.: Comprehensive survey of image steganography: techniques, evaluations, and trends in future research. Neurocomputing 335, 299–326 (2019). https://doi.org/10.1016/j.neucom.2018.06.075

    Article  Google Scholar 

  7. Hussain, M.; Wahab, A.W.A.; Bin Idris, Y.I.; Ho, A.T.S.; Jung, K.H.: Image steganography in spatial domain: a survey, signal process. Image Commun. 65, 46–66 (2018). https://doi.org/10.1016/j.image.2018.03.012

    Article  Google Scholar 

  8. Bhargava, S.; Mukhija, M.: Hide image and text using LSB DWT and RSA based on image steganography ICTACT. J. Image Video Process 9(3), 1940–1946 (2019). https://doi.org/10.21917/ijivp.2019.0275

    Article  Google Scholar 

  9. Yahya, A.: Steganography techniques. Steganogr. Tech. Digit. Images 2, 9–42 (2019). https://doi.org/10.1007/978-3-319-78597-4_2

    Article  Google Scholar 

  10. Hamid, N.; Yahya, A.; Ahmad, R.B.; Al-Qershi, O.M.: Image steganography techniques: an overview. Int. J. Comput. Sci. Secur. 6(3), 168–187 (2012)

    Google Scholar 

  11. Kumar, V.; Kumar, D.: Performance evaluation of DWT based image steganography. IEEE 2nd Int. Adv. Comput. Conf. (IACC) (2010). https://doi.org/10.1109/IADCC.2010.5423005

    Article  Google Scholar 

  12. Hamid, N., Yahya, A., Ahmad, R.B., Najim, L., Perlis, K.K.: Steganography in image files : a survey School of Computer and Communication Engineering University Malaysia Perlis (UniMAP) Ministry of Science and Technology Iraq, Baghdad 7(1), 35–55 (2013)

  13. Shejul, A.A.; Kulkarni, U.L.: A DWT based approach for steganography using biometrics. DSDE—Int Conf. Data Storage Data Eng. 2010, 39–43 (2010). https://doi.org/10.1109/DSDE.2010.10

    Article  Google Scholar 

  14. Alshoura, W.; Zainol, Z.; Teh, J.; Alawida, M.; Alabdulatif, A.: Hybrid SVD-based image watermarking schemes: a review. IEEE Access 9, 32931–32968 (2021). https://doi.org/10.1109/ACCESS.2021.3060861

    Article  Google Scholar 

  15. Gutub, A.; Al-Shaarani, F.: Efficient Implementation of multi-image secret hiding based on LSB and DWT steganography comparisons. Arab. J. Sci. Eng. 45(4), 2631–2644 (2020). https://doi.org/10.1007/s13369-020-04413-w

    Article  Google Scholar 

  16. Elharrouss, O.; Almaadeed, N.; Al-Maadeed, S.: An image steganography approach based on k-least significant bits (k-LSB). IEEE Int. Conf. Inform. IoT Enab. Technol. (ICIoT) (2020). https://doi.org/10.1109/ICIoT48696.2020.9089566

    Article  Google Scholar 

  17. Sahu, A.K.; Swain, G.: A novel n-rightmost bit replacement image steganography technique. 3D Res. (2019). https://doi.org/10.1007/s13319-018-0211-x

    Article  Google Scholar 

  18. Blakley G.: Safeguarding cryptographic keys. Int. Work. Manag. Req. Knowl., MARK (1979). https://doi.org/10.1109/MARK.1979.8817296

  19. Miranda-López, V., et al.: Experimental analysis of secret sharing schemes for cloud storage based on RNS. Commun. Comput. Inf. Sci. 796, 370–383 (2018). https://doi.org/10.1007/978-3-319-73353-1_26

    Article  Google Scholar 

  20. Tchernykh, A., et al.: Performance evaluation of secret sharing schemes with data recovery in secured and reliable heterogeneous multi-cloud storage. Cluster Comput. 22(4), 1173–1185 (2019). https://doi.org/10.1007/s10586-018-02896-9

    Article  Google Scholar 

  21. Raman, R., Varshney, L.: Distributed storage meets secret sharing on the blockchain. Inf. Theory Appl. Workshop (ITA). https://doi.org/10.1109/ITA.2018.8503089

  22. Fukumitsu, M., Hasegawa, S., Iwazaki, J., Sakai, M., Takahashi, D.: A proposal of a secure P2P-type storage scheme by using the secret sharing and the blockchain. In: International Conference on Advanced Information Networking and Applications, AINA, 2017, pp. 803–810. https://doi.org/10.1109/AINA.2017.11

  23. Xiong, F.; Xiao, R.; Ren, W.; Zheng, R.; Jiang, J.: A key protection scheme based on secret sharing for blockchain-based construction supply chain system. IEEE Access 7, 126773–126786 (2019). https://doi.org/10.1109/ACCESS.2019.2937917

    Article  Google Scholar 

  24. Rashid Ibrahim, D., Sen Teh, J., Abdullah, R., Ibrahim, D.R., Teh, J.S., Abdullah, R., Multifactor authentication system based on color visual cryptography, facial recognition and dragonfly optimization ARTICLE multifactor authentication system based on color visual cryptography, facial recognition and dragonfly optimization. Artic. Inf. Secur. J. A Glob. Perspect. 30(3): 149–159 (2020). https://doi.org/10.1080/19393555.2020.1817633

  25. Al-Ghamdi, M.; Al-Ghamdi, M.; Gutub, A.: Security enhancement of shares generation process for multimedia counting-based secret-sharing technique. Multimed. Tools Appl. 78(12), 16283–16310 (2019). https://doi.org/10.1007/s11042-018-6977-2

    Article  Google Scholar 

  26. Gutub, A.; Al-Qurashi, A.: Secure shares generation via m-blocks partitioning for counting-based secret sharing. J Eng Res 8(3), 91–117 (2020). https://doi.org/10.36909/JER.V8I3.8079

    Article  Google Scholar 

  27. Al-Qurashi, A.; Gutub, A.: Reliable Secret key generation for counting-based secret sharing. J. Comput. Sci. Comput. Math. (JCSCM) 8(4), 87–101 (2018). https://doi.org/10.20967/jcscm.2018.04.006

    Article  Google Scholar 

  28. Gutub, A.; Alkhodaidi, T.: Smart Expansion of Target Key for More Handlers to Access Multimedia Counting-Based Secret Sharing, Multimedia Tools and Applications (MTAP) (2020) (in press). https://doi.org/10.1007/s11042-020-08695-y

  29. Gutub, A.; Al-Ghamdi, M.: Image based steganography to facilitate improving counting-based secret sharing, 3D research, Springer, ISSN 2092–6731, 10, 6 (2019). https://doi.org/10.1007/s13319-019-0216-0

  30. Gutub, A.: Regulating watermarking semi-authentication of multimedia audio via counting-based secret sharing, Pamukkale University Journal of Engineering Sciences, in press (2021). https://doi.org/10.5505/pajes.2021.54837

  31. Gutub, A.: Watermarking images via counting-based secret-sharing for lightweight semi-complete authentication. Int. J. Inf. Secur. Privacy (IJISP), Accepted in 2021, in press to appear in Vol. 16, No. 1, Aricle 18

  32. Gutub, A.; Alaseri, K.: Refining Arabic text stego-techniques for shares memorization of counting-based secret sharing. J. King Saud Univ. Comput. Inf. Sci. (2019). https://doi.org/10.1016/j.jksuci.2019.06.014

    Article  Google Scholar 

  33. AlKhodaidi, T.; Gutub, A.: Refining image steganography distribution for higher security multimedia counting-based secret-sharing, Multimed. Tools Appl. (MTAP), in press (2020). https://doi.org/10.1007/s11042-020-09720-w

  34. Gutub, A.; Al-Ghamdi, M.: Hiding shares by multimedia image steganography for optimized counting-based secret sharing. Multimed. Tools Appl. (MTAP) 79, 7951–7985 (2020). https://doi.org/10.1007/s11042-019-08427-x

    Article  Google Scholar 

  35. Kaggle: Dataset. https://www.kaggle.com/vic006/beginner. Accessed 30 Jan 2021

  36. Pradhan, A.; Sahu, A.K.; Swain, G.; Sekhar, K.R.: Performance evaluation parameters of image steganography techniques. In: International Conference on Research Advances in Integrated Navigation Systems, RAINS 2016, pp. 1–8 (2016). https://doi.org/10.1109/RAINS.2016.7764399

  37. Setiadi, D.: PSNR versus SSIM: imperceptibility quality assessment for image steganography. Multimed, Tools Appl, (2020). https://doi.org/10.1007/s11042-020-10035-z

    Article  Google Scholar 

  38. Al-Shaarani, F.; Gutub, A.: Securing Matrix counting-based secret-sharing involving crypto steganography. J. King Saud University - Comput. Inform. Sci. (2021). https://doi.org/10.1016/j.jksuci.2021.09.009

    Article  Google Scholar 

  39. Gutub, A.: Regulating watermarking semi-authentication of multimedia audio via counting-based secret sharing. Pamukkale University J. Eng. Sci. (2021). https://doi.org/10.5505/pajes.2021.54837

    Article  Google Scholar 

  40. Shambour, M.K.; Gutub, A.: Personal privacy evaluation of smart devices applications serving hajj and umrah rituals. J. Eng. Res. (2021). https://doi.org/10.36909/jer.13199

    Article  Google Scholar 

  41. Gutub, A.; Al-Roithy, B.: Varying PRNG to improve image cryptography implementation. J. Eng. Res. 9(3A), 153–183 (2021). https://doi.org/10.36909/jer.v9i3A.10111

    Article  Google Scholar 

Download references

Acknowledgements

Thanks are due to Umm Al-Qura University for motivating this collaborative research.

Funding

There is no funding source.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Adnan Gutub.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical Approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Informed Consent

Informed consent was obtained from all individual participants included in the study.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Al-Shaarani, F., Gutub, A. Increasing Participants Using Counting-Based Secret Sharing via Involving Matrices and Practical Steganography. Arab J Sci Eng 47, 2455–2477 (2022). https://doi.org/10.1007/s13369-021-06165-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13369-021-06165-7

Keywords

Navigation