The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


A New (k, n) Secret Image Sharing Scheme (SISS)

In this paper, a new (k, n) threshold Secret Image Sharing Scheme (SISS) is proposed. In the proposed scheme the secret image is first partitioned into several non-overlapping blocks of k pixels. Every k pixel is assumed as the vertices of a complete graph G. Each spanning tree of G is represented by k pixels along with Prüfer sequence and used to form k pixels of a share image. The original secret image can be restored by k or more shares and cannot be reconstructed by (k-1). The experimental results indicate that the proposed SISS is an efficient and safe method.

 


[1] Arthanari S., Mastan M., and Bagank B., “Chaotic Image Encryption using Modular Addition and Combinatorial Techniques,” The International Arab Journal of Information Technology, vol. 12, no. 2, pp.110-117, 2015.

[2] Blakely G., “Safeguarding Cryptography Keys,” in Proceeding of National Computer Conference, New York, pp. 313-317, 1979.

[3] Cayley A., “A Theorem on Trees,” A Quarterly Journal of Pure and Applied Mathematics, vol. 23, no. 4, pp. 376-378, 1889.

[4] Cheddad A., Condell J., Curran K., and Kevitt P., “Digital Image Steganography: Survey and Analysis of Current Methods,” Signal Processing, vol. 90, no. 3, pp. 727-752, 2010.

[5] Chen C. and Fu W., “A Geometry-based Secret Image Sharing Approach,” Journal of Information Science and Engineering, vol. 24, no. 5, pp. 1567- 1577, 2008.

[6] Huang C. and Nien H., “Multi Chaotic Systems based Pixel Shuffle for Image Encryption,” Optics Communications, vol. 282, no. 11, pp. 2123-2127, 2009.

[7] Lin Y. and Wang R., “Scalable Secret Image Sharing with Smaller Shadow Images,” in IEEE Signal Processing Letters, vol. 17, no. 3, pp. 316- 319, 2010.

[8] Liu H., Wang X., and Kadir A., “Image encryption using DNA Complementary Rule and Chaotic Maps,” Applied Soft Computing, vol. 12, no. 5, pp.1457-1466, 2012.

[9] Liu L., Wang A., Chang C., and Li Z., “A Novel Real-Time and Progressive Secret Image Sharing with Flexible Shadows based on Compressive Sensing,” Signal Processing: Image Communication, vol. 29, no.1, pp.128-134, 2014.

[10] Ou D., Ye L., and Sun W., “User-Friendly Secret Image Sharing Scheme with Verification Ability based on Block Truncation Coding and Error Diffusion,” Journal of Visual Communication and Image Representation, vol. 29, no. C, pp. 46-60, 2015.

[11] Por L., Beh D., Ang T., and Ong S., “An Enhanced Mechanism for Image Steganography using Sequential Colour Cycle Algorithm,” The International Arab Journal of Information Technology, vol. 10, no. 1, pp. 51-60, 2013.

[12] Prufer H., https://en.wikipedia.org/wiki/Pr%C3%BCfer_se quence#cite_ref-1, Last Visited 2014.

[13] Shamir A., “How to Share a Secret,” Communications of the ACM, vol. 22, no. 11, pp. 612-613, 1979.

[14] Thien C. and Lin J., “Secret Image Sharing,” Computer and Graphics, vol. 26, no. 5, pp. 765- 770, 2002.

[15] Tso H., “Sharing Secret Images using Blakely Concept,” Optical Engineering, vol. 47, no. 7, 2008.

[16] Wang X., Liu L., and Zhang Y., “A Novel Chaotic Block Image Encryption Algorithm based on Dynamic Random Growth Technique,” Optics and Lasers in Engineering, vol. 66, no.1 pp.10-18, 2015.

[17] Wang Z., Bovik A., Sheikh H., and Simoncelli E., “Image Quality Assessment: from error Visibility to Structural Similarity,” IEEE Transactions on Image Processing, vol. 13, no. 4, pp. 600-612, 2004.

[18] Wu X., “A Secret Image Sharing Scheme for Light Images,” EURASIP Journal on Advances in Signal Processing, vol. 2013, no. 1, pp. 1-5, 2013.

[19] Wu X., Ou D., Liang Q., and Sun W., “A User- Friendly Secret Image Sharing Scheme with Reversible Steganography based on Cellular Automata,” The Journal of Systems and Software, vol. 85, no. 8, pp. 1852- 1863, 2012.

[20] Zhao R., Zhao J., Dai F., and Zhao F., “A New Image Sharing Scheme to Identify Cheaters,” Computer Standard and Interfaces, vol. 31, no. 1, pp. 252-257, 2009. 456 The International Arab Journal of Information Technology, Vol. 14, No. 4, July 2017 Amitava Nag received his M. Tech. degree from University of Calcutta,Kolkata,India in 2005. Currently he is working as an Assistant Professor and Head in Dept. of IT, Academy of Technology, India and also working towards his PhD at the Dept. of Engineering and Technological Studies, University of Kalyani, India. He is a member of IEEE, ACM and CSI. His areas of interest include Image Processing, Information Security, and Data Mining. Sushanta Biswas obtained his Ph.D in engineering from Jadavpur University in the year 2004. He obtained his M.E from Jadavpur University and B.E from Bengal Engineering College (Presently known as Bengal Engineering and Science University, Shibpur) in the year 1994 and 1990 respectively. He is presently working as Associate Professor in the Dept. of Engineering and Technological Studies, University of Kalyani. He has more than 14 years of teaching experience. His area of interest includes, Artificial Neural Network, Image Processing, Frequency Selective Surfaces, Microstrip Antennas. Debasree Sarkar has obtained her Ph.D degree in Engineering from Jadavpur University in the year 2005. She has obtained her M.E and B.E from Bengal Engineering College (presently known as Bengal Engineering and Science University, Shibpur) in the year 1994 and 1991 respectively. She is presently working as Associate Professor in Dept. of Engineering and Technological Studies, University of Kalyani. She has more than 14 years of teaching experience. Her area of research includes Artificial Neural Network, Microstrip Antenna, Frequency Selective Surfaces, and Embedded Systems. Partha Sarkar obtained his Ph.D in engineering from Jadavpur University in the year 2002. He has obtained his M.E from Jadavpur University in the year 1994. He earned his B.E degree in Electronics and Telecommunication Engineering from Bengal Engineering College (Presently known as Bengal Engineering and Science University, Shibpur) in the year 1991. He is presently working as Professor and Head at the Dept. of Engineering and Technological Studies, University of Kalyani. His area of research includes, Microstrip Antenna, Microstrip Filter, Frequency Selective Surfaces, and Artificial Neural Network. He has contributed to numerous research articles in various journals and conferences of repute. He is also a life Fellow of IETE.