Skip to main content
Log in

Reversible secret image sharing scheme in encrypted images

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The previous secret image sharing schemes did not provide a copyright and privacy for cover images. The reason is that a dealer selects a cover image by itself and embeds directly the secret data into the cover image. In this paper, a reversible secret image sharing scheme in encrypted images is proposed in order to provide the copyright and privacy of the cover image. We divide a role of the dealer into an image provider and a data hider. The image provider encrypts the cover image and transmits the encrypted image to the data hider, and the standard stream cipher as one-time pad (OTP) with a random secret key is used. The data hider embeds the secret data into the encrypted image, and the encrypted shadow images are transmitted to the corresponding participant. We utilize the polynomial arithmetic operation over GF(28) during the sharing of the encrypted shadow images, and the coefficient of the highest-order term is fixed to one in order to prevent the overflow and the security problem. In the reconstruction procedure, the secret data can be extracted and the cover image can be reconstructed exactly from t or more encrypted shadow images with Lagrange interpolation. In experimental results, the proposed method shows that the PSNR is sustained close to 44 dB regardless of the embedding capacity, where the embedding capacity is 524,288 bits on average.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Beimel A, Chor B (1998) Secret sharing with public reconstruction. IEEE Trans Inf Theory 44(5):1887–1896

    Article  MathSciNet  MATH  Google Scholar 

  2. Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 35(3.4):313–336

    Article  Google Scholar 

  3. Berry S (1999) A simple publicly verifiable secret sharing scheme and its application to electronic voting. In: Advances in cryptology- CRYPTO’99. Lecture notes in computer science, vol 1666, pp 148–164

  4. Chang C-C, Hsieh Y-P, Lin C-H (2008) Sharing secrets in stego images with authentication. J Pattern Recognit 41(10):3130–3137

    Article  MATH  Google Scholar 

  5. Harn L, Fuyou M (2014) Multilevel threshold secret sharing based on the Chinese Remainder Theorem. Inf Process Lett 114(9):504–509

    Article  MathSciNet  MATH  Google Scholar 

  6. Hong W, Chen T-S, Wu H-Y (2012) An improved reversible data hiding in encrypted images using side match. IEEE Signal Process Lett 19(4):199–202

    Article  Google Scholar 

  7. Josh B, Jerry L (1990) Generalized secret sharing and monotone functions. In: Advances in cryptology-CRYPTO’88. Lecture notes in computer science, LNCS, vol 403, pp 27–35

  8. Katzenbeisser S, Petitcolas FAP (2000) Information Hidhing Techniques for steganography and digital watermarking. Artech House

  9. Lin C-C, Liao LH, Hwang KF, Chen S-C (2012) Reversible secret-image sharing with high visual quality. Multimedia tools and applications. Springer, pp 1–19

  10. Lin C-C, Tsai W-H (2004) Secret image sharing with steganography and authentication. J Syst Softw 73(3):405–414

    Article  MathSciNet  Google Scholar 

  11. Lin P-Y, Chan C-S (2010) Invertible secret image sharing with steganography. Pattern Recogn Lett 31(13):1887–1893

    Article  MathSciNet  Google Scholar 

  12. Luo L, Chen Z, Chen M, Zeng X, Xiong Z (2010) Reversible image watermarking using interpolation technique. IEEE Trans Inf Forensics Secur 5(1):187–193

    Article  Google Scholar 

  13. Ma K-L, Zhang W, Zhao X, Yu N, Li F (2013) Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans Inf Forensics Secur 8(3):553–562

    Article  Google Scholar 

  14. Martín del Rey A (2015) A multi-secret sharing scheme for 3D solid objects. Expert Syst Appl 42(4):2114–2120

    Article  Google Scholar 

  15. Menezes AJ, Van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC Press

  16. Mitsuru I, Akira S, Takao N (1989) Secret sharing scheme realizing general access structure. Electron Commun Jpn (Part III: Fundamental Electronic Science) 72(9):1520–6440

    MathSciNet  Google Scholar 

  17. Mustafa U, Ulutas G, Nabiyev VV (2013) Invertible secret image sharing for gray level and dithered cover images. J Syst Softw 86(2):485–500

    Article  Google Scholar 

  18. Naor M, Shamir A (1995) Visual cryptography. In: Advances in cryptology, EUROCRYPT’94. Springer, Berlin, Heidelberg

  19. Naor M, Shamir A (1997) Visual cryptography II: improving the contrast via the cover base. Security protocols. Springer, Berlin

    Google Scholar 

  20. Pakniat N, Noroozi M, Eslami Z (2014) Secret image sharing scheme with hierarchical threshold access structure. J Vis Commun Image Represent 25(5):1093–1101

    Article  Google Scholar 

  21. Paul F (1987) A practical scheme for Non-Interactive verifiable secret sharing. In: Proceedings of the 28th annual symposium on foundations of computer science, pp 427–438

  22. Qin C, Chang C-C, Huang Y-H, Liao L-T (2013) An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism. IEEE Trans Circuits Syst Video Technol 23(7):1109–1118

    Article  Google Scholar 

  23. Qin C, Zhang X (2015) Effective reversible data hiding in encrypted image with privacy protection for image content. J Vis Commun Image Represent 31:154–164

    Article  Google Scholar 

  24. Shamir A (1979) How to share a secret. Commun. ACM 22:612–613

    Article  MathSciNet  MATH  Google Scholar 

  25. Stallings W (2006) Cryptography and network security, 4th edn. Prentice Hall

  26. Stinson DR (2006) Cryptography theory and practice, 3rd edn. Chapman & Hall/CRC Press

  27. Thien C-C, Lin J-C (2002) Secret image sharing. Comput Graph 26(5):765–770

    Article  Google Scholar 

  28. Thien C-C, Lin J-C (2003) An image sharing method with user-friendly shadow images. IEEE Trans Circuits Syst Video Technol 13(12):1161–1169

    Article  Google Scholar 

  29. Van Schyndel RG, Tirkel AZ, Osborne CF (1994) A digital watermark, vol 2. IEEE

  30. Wang R-Z, Shyu S-J (2007) Scalable secret image sharing. J Signal Process Image Commun 22(4):363–373

    Article  Google Scholar 

  31. Yang C-N, Chen T-S, Yu K-H, Wang C-C (2007) Improvements of image sharing with steganography and authentication. J Syst Softw 80(7):1070–1076

    Article  Google Scholar 

  32. Yuan H-D (2014) Secret sharing with multi-cover adaptive steganography. Inf Sci 254:197–212

    Article  MathSciNet  MATH  Google Scholar 

  33. Zhang X (2011) Reversible data hiding in encrypted image. IEEE Signal Process Lett 18(4):255–258

    Article  Google Scholar 

Download references

Acknowledgments

This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education(No. 2015R1D1A1A01058019).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ki-Hyun Jung.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shin, SH., Jung, KH. Reversible secret image sharing scheme in encrypted images. Multimed Tools Appl 75, 13931–13949 (2016). https://doi.org/10.1007/s11042-016-3844-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-3844-x

Keywords

Navigation