Reviewing Multiple Secret Image Sharing Scheme based on Matrix Multiplication

Similar documents
Progressive secret image sharing scheme using meaningful shadows

A Novel (2,n) Secret Image Sharing Scheme

Multi Secret Sharing Scheme for Encrypting Two Secret Images into Two Shares

Webpage: Volume 4, Issue VI, June 2016 ISSN

VISUAL CRYPTOGRAPHY for COLOR IMAGES USING ERROR DIFFUSION AND PIXEL SYNCHRONIZATION

International Journal of Advance Research in Computer Science and Management Studies

Visual Cryptography. Frederik Vercauteren. University of Bristol, Merchant Venturers Building, Woodland Road, Bristol BS8 1UB.

A Cost-Effective Private-Key Cryptosystem for Color Image Encryption

A STENO HIDING USING CAMOUFLAGE BASED VISUAL CRYPTOGRAPHY SCHEME

An Overview of Visual Cryptography Schemes for Encryption of Images

Visual Cryptography Scheme for Gray Scale Images based on Intensity Division

Secured Bank Authentication using Image Processing and Visual Cryptography

A Visual Cryptography Based Watermark Technology for Individual and Group Images

A Rumination of Error Diffusions in Color Extended Visual Cryptography P.Pardhasaradhi #1, P.Seetharamaiah *2

Abstract. 1 Introduction. 2 The Proposed Scheme. The 29th Workshop on Combinatorial Mathematics and Computation Theory

An Efficient Interception Mechanism Against Cheating In Visual Cryptography With Non Pixel Expansion Of Images

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Various Visual Secret Sharing Schemes- A Review

Evaluation of Visual Cryptography Halftoning Algorithms

Meta-data based secret image sharing application for different sized biomedical

Enhanced Efficient Halftoning Technique used in Embedded Extended Visual Cryptography Strategy for Effective Processing

Survey on Size Invariant Visual Cryptography

Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme

Local prediction based reversible watermarking framework for digital videos

A Simple Scheme for Visual Cryptography

Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning

Implementation of Colored Visual Cryptography for Generating Digital and Physical Shares

IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING VISUAL CRYPTOGRAPHY

Performance Evaluation of Floyd Steinberg Halftoning and Jarvis Haltonong Algorithms in Visual Cryptography

High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction

Comparison of Visual Cryptographic Algorithms for Quality Images Using XOR

Digital Image Sharing using Encryption Processes

Secret Sharing Image Between End Users by using Cryptography Technique

Sunil Karforma Associate Professor Dept. of Computer Science The University of Burdwan Burdwan, West Bengal, India

Visual Secret Sharing Based Digital Image Watermarking

Coverless Text Information Hiding Method Using the Frequent Words Hash

Digital Image Sharing and Removing the Transmission Risk Problem by Using the Diverse Image Media

AN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES. N. Askari, H.M. Heys, and C.R. Moloney

Analysis of Secret Share Design for Color Image using Visual Cryptography Scheme and Halftone

Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers

International Conference on Advances in Engineering & Technology 2014 (ICAET-2014) 48 Page

Progressive sharing of multiple images with sensitivity-controlled decoding

Copyright protection scheme for digital images using visual cryptography and sampling methods

A Recursive Threshold Visual Cryptography Scheme

LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE THE METHOD

Fixed Unmitigated Image Cryptography Schemes

Journal of Discrete Mathematical Sciences & Cryptography Vol. ( ), No., pp. 1 10

A Reversible Data Hiding Scheme Based on Prediction Difference

Implementation and Performance Testing of the SQUASH RFID Authentication Protocol

Dual Visual Cryptography Using the Interference Color of Birefringent Material

DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON

Data Hiding Algorithm for Images Using Discrete Wavelet Transform and Arnold Transform

Introduction to More Advanced Steganography. John Ortiz. Crucial Security Inc. San Antonio

Unlinkability and Redundancy in Anonymous Publication Systems

EXTENDED AND EMBEDDED VISUAL CRYPTOGRAPHY

Halftone based Secret Sharing Visual Cryptographic Scheme for Color Image using Bit Analysis

A New Compression Method for Encrypted Images

Block Truncation Coding (BTC) Technique for Regions Image Encryption

Image Encryption Based on New One-Dimensional Chaotic Map

A Novel Technique in Visual Cryptography

Transform. Jeongchoon Ryoo. Dong-Guk Han. Seoul, Korea Rep.

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise

Watermarking patient data in encrypted medical images

Progressive Color Visual Cryptography

Introduction to DSP ECE-S352 Fall Quarter 2000 Matlab Project 1

ENHANCED SECURITY SYSTEM USING SYMMETRIC ENCRYPTION AND VISUAL CRYPTOGRAPHY

REVERSIBLE data hiding, or lossless data hiding, hides

Colored Image Ciphering with Key Image

Dynamic Collage Steganography on Images

Four Level Multiple Image Sharing Scheme Using Visual Cryptography for Colour and Gray Scale Images Rajeev Kumar Sao 1, Mr. Prabhakar Sharma 2

Efficient Scheme for Secret Hiding in QR Code by Improving Exploiting Modification Direction

A New network multiplier using modified high order encoder and optimized hybrid adder in CMOS technology

Reversible Data Hiding in Encrypted Images based on MSB. Prediction and Huffman Coding

Protection of Privacy in Visual Cryptography Scheme Using Error Diffusion Technique

Data Security Using Visual Cryptography and Bit Plane Complexity Segmentation

Improved RGB -LSB Steganography Using Secret Key Ankita Gangwar 1, Vishal shrivastava 2

Cheating Prevention in Visual Cryptography using. Steganographic Scheme

Solutions to Exercises Chapter 6: Latin squares and SDRs

Comparative Histogram Analysis of LSB-based Image Steganography

Bidirectional Serpentine Scan Based Error Diffusion Technique for Color Image Visual Cryptography

Visual Secrete Sharing by Diverse Image Media

Keywords Arnold transforms; chaotic logistic mapping; discrete wavelet transform; encryption; mean error.

EFFICIENT VISUAL CRYPTOGRAPHY FOR GENERAL ACCESS STRUCTURES WITH STAMPING AND SYNTHESIZING

Journal of mathematics and computer science 11 (2014),

Image Enhancement using Histogram Equalization and Spatial Filtering

LSB Encoding. Technical Paper by Mark David Gan

An EVCS for Color Images with Real Size Image Recovery and Ideal Contrast Using Bit Plane Encoding

Moiré Cryptography. Yvo Desmedt. Tri Van Le. ABSTRACT 1. INTRODUCTION

中国科技论文在线. An Efficient Method of License Plate Location in Natural-scene Image. Haiqi Huang 1, Ming Gu 2,Hongyang Chao 2

Exploring Signature Schemes with Subliminal Channel

AN IMPROVED LSB METHOD OF STEGANOGRAPHY WITH JPEG COLORED IMAGE

Steganalytic methods for the detection of histogram shifting data-hiding schemes

Some Cryptanalysis of the Block Cipher BCMPQ

Color PNG Image Authentication Scheme Based on Rehashing and Secret Sharing Method

A New Representation of Image Through Numbering Pixel Combinations

Block Ciphers Security of block ciphers. Symmetric Ciphers

Chapter 4 MASK Encryption: Results with Image Analysis

DURING the past several years, independent component

Image Encryption using Pseudo Random Number Generators

Image Steganography using Sudoku Puzzle for Secured Data Transmission

Transcription:

Reviewing Multiple Secret Image Sharing Scheme based on Matrix Multiplication Fereshte Sheikh Sang Tajan Massoud Hadian Dehkordi Abdolrasoul Mirghadri Faculty and Research Center of Communication and Information Technology, IHU Tehran, Iran Department of Mathematical Sciences Iran University of Science and Technology Narmak, Tehran, 16844 Iran Faculty and Research Center of Communication and Information Technology, IHU Tehran, Iran Abstract Information security is one of the most important defensive issues to prevent the attackers' assault to the privacy of organizations' valuable information The secret sharing scheme is an attractive branch of advanced cryptography that has played crucial role in passive defense and it would be employed in protecting important information and documents against dangers like robbery and illegal accesses In this article a scheme based on the method of matrix multiple secret sharing is provided In which the shareholders reveal the artificial image (shadow image) instead of their genuine share to recover the image of secret In other word, each images sharing that has been efficiently and shareholder with having only one portion of secret image can share it with others in many of secret images Unlike other known secret sharing schemes, in this scheme the threshold images will not be produced in a way that are difficult to identification and control We also could create better speed and security through making change in this scheme by using row and column round in generator function The considered plan is a scheme of multiple secret practically performed with more appropriate speed Key words: Matrix multiplication, secret sharing, divider, multiple secret, artificial images, shadow 494

1 Introduction Cryptography has been founded when people was communicating with each other while their enemy could not be aware of the exchanged information So, if breaking the code of encrypted systems for attackers was more difficult and complicated they would have been able to provide the better security for their consumers, it is cleared that such systems have high value The security of a cryptography system has dependent on its key It may be supposed the best way to manage the key is putting it on a safe place where it has protected; but this way is not reliable because an unexpected bad event like intentional or accidental sabotages can lead information to be inaccessible A simple approach to prevent this problem can be storing several copies of key (secret) in different places; however it will reduce the key security Sometime the problem may be easier than occurrence of an unexpected bad event We tend to define precisely which subset of shareholders is able to determine the key and which cannot do that has been considered as a set of subsets, in fact participance subsets in are supposed as shareholders subsets which must be able to calculate the key Also has been called access structure Subsets of that are not able to key recovery has been called forbidden sets In 1979, secret sharing scheme was offered by Shamir and Blakley separately The secret sharing scheme has employed for identified secret information sharing between individuals of a specified group, as none of these people with certain share that is allocated to them, be unable to access the confidential information and the order of access to secret can be possible only through using shares of known sets of people Thus, secret sharing has increased reliability of a cryptography system Karnin and et al in 1983 {3} had introduced perfect secret sharing scheme and then they offered a type of secret sharing scheme based on multiple matrix for better security Naor and Shamir {4, 5} during Eurocrypt conference 1994 had offered a new type of sharing scheme which has been called visual cryptographyin this kind of cryptography, the distributer shares out a secret image on n transparency sheets among n people which subsets of the people would be able to recover the secret image by putting their transparencies on each other Shareholders of a participance subset would be able to recover original image through only storing their shares without any information about cryptography and without cryptography computing; a subset of them cannot obtain any information of secret by putting their transparencies on each other and then they will not be permitted to observe the secret image Hu & Gao in 2008 introduced the secret image sharing scheme which was based on multiple matrix; in order to create a share on secret image and distribute it to each shareholder, shares of new secret should be computed and distributed in each time Threshold images have been produced in most of image sharing schemes like {6, 9, 10, 12, 13 and 14} which their control, identification and distribution were difficult The existing visual secret sharing scheme has limited the number of secret images All mentioned schemes were one time scheme By expanding the number of secret images, a subject on new scheme of secret sharing has been considered for hiding multiple secret images which each shareholder must receive and retain its share in a multiple secret sharing scheme In this scheme, many secrets could have been shared independently and without redistribution In order to recover a secret, a shareholder receives and presents an unreal share obtained from original share in place of its genuine share; recovering a secret has not threatened remaining tools 495

(recovery other secrets) which has not recovered yet The article is structured as follows: Definitions and concepts have been brought in part 2 which may be required for some of the secret sharing schemes The multiple secret sharing scheme of Hu Zengfeng & Gao has been explained in part 3; we have introduced our proposal in part 4; an analysis of the reformed proposed scheme in part 5 and finally, conclusion of the article can be seen in part 6 2 Multiple secret sharing scheme A multiple secret shadow sharing scheme is a special multiple secret sharing scheme which basis have been defined through shadow It seems that every access structure of threshold multiple secret sharing can receive a scheme that is similar to Shamir's scheme 11 Cumulative threshold of image sharing scheme in matrix multiplication In 2008 Hu Zengfeng and et al {9} had proposed a compressed image sharing scheme that was based on Karnin scheme In the plan, secret image has been divided into several uncommon square blocks instead of single pixel and each block is considered as a secret matrix This plan could reduce shadow image to secret image on the base of coefficient matrix features and it did not require to permutation in image sharing phase However, the process was belonging to one time secret sharing scheme because the portion of shareholder would be revealed after recovering secret image On the other hand, in order to share another secret image, new secret shares must be computed and distributed again among shareholders 12 Multiple secret images sharing scheme based on matrix multiplication Hu Zengfeng & et al {10} in reforming their proposed scheme at {9} had presented a plan in 2009 which was derived from multiple secret image sharing based on matrix multiplication; in this plan shareholders was storing artificial images rather than their original share at the time of recovering secret images So each shareholder with having only one portion of secret was able to share it with others in many of secret images Unlike other known secret sharing schemes, in this scheme the threshold images which were difficult to be identified and controlled were not produced Their scheme was a plan of efficient and practical multiple secret image sharing scheme The mentioned plan is a secure multiple secret sharing scheme (t, n) that has the following features: 1 It has ability to perform parallel recovery that means it can recover several secrets simultaneously; 2 The intermediate can compute number of distributed secrets dynamically; 3 A scheme which is used several times has been employed in several secret sharing courses without distributing new shares The mentioned scheme of multiple secret images sharing has been derived from a complex scheme, as concealed shares of shareholders would not be revealed at the time of recovering secret image The scheme will emerge only some general information rather than producing shadow images Advantages of this scheme have possessed following characteristics in comparison with other secret sharing schemes: Each shareholder with having only one portion of secret can share it with others in many of secret images On the other hand, each secret portion of any shareholder will not be revealed in recovery phase The present scheme has created shadow images in secret image sharing 496

phase that can protect it from problems like distribution images, control and identification In image recovery phase, shareholders cooperating with each others can recover secret image completely through general information and their concealed share 3 Describing Hou Zhengfeng & et al scheme a Initiative phase: In this phase has been considered as a one-way function of two variables Divider (D) has dealt out a number of secret images and a set of matrix on that has been made as a general determiner of shareholders and then divider has supposed - matrix on as general information which they consisted each dimension of matrix In this scheme, every of should have full rank and every of and of must be full rank; here the amount of would be Then, divider has chosen which as the concealed share of the corresponding shareholders b Secret image sharing phase: Size of in secret image is that divider has shared it as follows 1 in secret image has been shared in several uncommon blocks of with size of and generating image has been chosen which is corresponded with and has similar size of and then would be shared in several uncommon blocks of with size of, 2 Amount of has been calculated and values of in matrix would be changed such as pseudo shadow with size of that the value of and are placed in and 3 The equation of has been considered as following relations: (1-3-3) (2-3-3) Then value of would be computed ( is block of that the value of and are, ) 4 Value of would be computed that is j block of as general image with the amount of that is 5 Relationship between, general image and of generating image has been presented that c Recovering secret image phase: 1 By creating the image of, each shareholder can obtain and compute the value of through presenting image of its shadow and then it would be able to reflect them in a matrix with form of with and 2 With general information of, shareholders can calculate on the base of the following equation: B1, Uj Bn t(mod 251) (3-3-3) In this equation the value of counted as follows: would be (4-3-3) 497

The value of is 3 Shareholders cooperating with each other are able to transform to and calculate the value of then all would be combined to create secret image that d Sharing Other image: At the time of sharing or other image, divider must choose generator image different from and repeat the secret image sharing phase in subsection (b) Similarly shareholders cooperating with each other can acquire image through repeating the step of recovering secret image that was explained in subsection (c) 31 Our proposed scheme; Multiple secret images sharing scheme is derived from complicated plan In this paper we have improved the scheme of Hou Zhengfeng and Gao Hanjun [11] with a change in method of making shares of generating image It is cleared that the improved scheme has created better speed and security As it was mentioned the scheme has shown only some of the general information rather than creating threshold images and also concealed portions of shareholders would not be revealed at the time of recovering secret image a Initiative phase: First one-way function of two variables has been considered as a special type of hash function and then would be proposed (in terms of better speed and security in comparison with the presented function in [29] scheme) Divider D must share certain numbers of secret images Divider has made a set of n matrix in as a general determiner of shareholders then supposed - matrix in as general information; each dimension of matrix is Every of has full rank and every of and any of have possessed full rank that After that, the divider has chosen which would be as the concealed share of the corresponding shareholders b Secret image sharing phase: Size of in secret image is that divider D has shared it as follows 1 Secret image has been shared in several uncommon blocks of with size of and then corresponding generator image with similar size of has been computed through function of and in this function 2 By calculating the amount of and then transforming it to matrix, shareholder of pseudo shadow with size of would be created with and The equation of has been established as following relations: And the value of would be computed ( is block of that and ) The equation has been calculated that is j block of general image with the amount of that is Relationship between, general image and of generating image has been presented which c Recovering secret image phase: 498

1 By creating the image of, each shareholder can obtain and compute generating function of and then it would be able to put them in a matrix with form of with and the amount of that is If, the row round will be which 2 With general information of, shareholders can calculate and consider the following equation: B1, Uj Bn t(mod 251) The can be calculated as follows: And it may be possible to see input of as the following square matrix They are parameters which are given to shareholders With the value of that is 3 Shareholders cooperating with each other are able to divide to and calculate the value of then all would be stored to reveal secret image with d Sharing another image: At the time of sharing another image, the divider only requires to choose a generator image different from and repeat the secret image sharing phase in subsection (b) Similarly shareholders cooperating with each other can acquire image through repeating the step of recovering secret image that was explained in subsection (c) In row round function, matrix rows have been ordered into quarter round in parallel way with permutation of each row Amounts of,, and respectively have been put in the first row of the row round function Amounts,, and would be placed in the second row of the row round function orderly In the third row of the row round function, amounts of,, and have been arranged respectively and the amounts of,, and have been put orderly in the fourth row of the row round function 2 Column round function If, the column round will be which 311 Function of is operated as follows: 1 Row round function 499

And it may be possible to see input of as the following square matrix In column round function, matrix column have been ordered into quarter round in parallel way with permutation of each row Amounts of,, and respectively have been put in the first column of the column round function Amounts of,, and would be placed in the second column of the column round function orderly In the third column of the column round function, amounts of,, and have been arranged respectively and the amounts of,, and have been put orderly in the fourth column of the column round function If input function of is 16 the output of it will be 16 312 Defining the relations of proposed function: Cryptography function of is a long chain including three simple operations on 32 bit words: Sum of 32-bit: a b (mod32), a and b all of them are 32-bit 32-bit XOR: axor b, a and b all of them are 32-bit Rotation with 32-bit fixed distance: a b, 32-bit word and a, b bit have shifted towards left It should be mentioned B is fix Above operation can be created and implemented through any circuit The objective of this scheme is to increase speed along with a good security Figure (1-5): Function between x and y in core of function =qarterround We have performed MATLAB programming in scheme 1-5 through an example which reforming the executable scheme has been implemented with high speed and security 4 Security-efficiency analysis The mentioned scheme is multiple secret images sharing scheme Divider (D) needs only to choose new generator image for each secret image and repeat the steps of secret image sharing at the time of different secret images sharing We have employed the one-way hash function of two variables to improve the scheme and we observe that speed and security of the scheme have increased through using function in computation Shareholders require only to combine in pseudo shadow image rather than revealing their secret share (x) Thus, the secret share (x) of each shareholder can be used several times This scheme has been employed effectively in most cases Therefore, the scheme not only can be shared in secret image without creating shadow images and is able to prevent from other problems of multiple secret images sharing schemes; but also the time, memory complexity, consumption time of memory status and implementation plan of the scheme have been considered 500

5 Conclusion In this article east t shareholder has recovered multiple secret images and each shareholder keeps only one share In the scheme of Hou Zhengfeng and Gao Hanjun a number of information simultaneously has been created instead of shadow images which includes identification, distribution and control information Accordingly, the multiple secret images sharing scheme is an effective and practical scheme, whereas a new and effective generator function has been employed in our reformed scheme that has caused speed and security improvement Computation time is so complicated 7Reference [1] Shamir A How to share a secret[j] CommunACM, 1979 24(11):612-613 [2] Blakley G R Safeguarding cryptographic keys[c] Proc of AFIPS 1979 National Computer Conference, 1979:313-317 [3] EDKarnin,JWGreene,MEHellman On Sharing Secret Systems[J]IEEE Transactions on Information Theory,1983, 29(1):35-41 [4] M Naor, A Shamir Visual cryptography[c] Advances in Cryptology-Eurocrypt 94, 1994:1-12 [5] M Naor, A Shamir Visual cryptography II: Improving the contras via the cover base[c] Lecture Notes in Computer science, SpringerBerlin 1997(1189):197-202 [6] CC Thien, JC Lin Secret image sharing[j] Computer&Graphic,2002,26(5):765-770 [7] Daniel jbernstein "Salsa 20 specification"department of Mathematics, Statistics, and Computer Science (M/C 249) The University of Illinois at Chicago, Date: 20071225 [8] Li Bai A Reliable (k, n) Image Secret Sharing Scheme[C]Dependable, Autonomic and Secure Computing, 2nd IEEE International Symposium on Sept, 2006:31-36 [9] Li Bai A strong ramp secret sharing scheme using matrix projectionworld of Wireless[C], Mobile and Multimedia NetworksInternational Symposium on 26-29 62006, pages:5 pp [10] Hou Zhengfeng, Gao Hanjun A compressible threshold image sharing scheme based on matrix multiplication[j] Geomatics and Information Science of Wuhan University 2008, 33(10):1003-1006 [11] Hou Zhengfeng, Gao Hanjun Multi- secret image sharing based on matrix multiplication,ieee International conference on networks security(2009),vol1,pp184-187 [12] Ran-Zan Wang, Chin-Hui Su Secret image sharing with smaller shadow images [J] Pattern Recognition Letters 27 (2006) 551 555 [13] Chin-Chen Chang, Chia-Chen Lin, Chia- Hsuan Lin, Yi-Hui Chen A novel secret image sharing scheme in color images using small shadow images [J] Information Sciences 178 (2008) 2433 2447 [14] Shi Runhua, Zhong Hong, Huang Liusheng, Luo Yonglong A (t,n) Secret Sharing Scheme for Image Encryption [C] 2008 Congress on Image and Singal Processing 27-30 May 2008:3-6 [15] Chien HY, Jan JK, Tseng YM A practical (t,n) multi-secret sharing scheme[j] IEICE Transactions on Fundamentals 2000, E83- A(12):2762-2765 [16] PANG LJ,WANG YM A new (t,n) multisecret sharing scheme based on Shamir s secret sharing[j] Applied Mathematics andcomputation, 2005,167(2):840-848 [17] Yang CC,Chang TY,Hwang MS A (t,n) multi-secret sharing scheme[j] Applied Mathematics and Computation, 2004, 151(2):483-490 501