Keywords

1 Introduction

Secret sharing scheme was initially proposed by Blakely and Shamir in 1979 [1, 2, 3]. In general this secret sharing scheme is also called (k,n) secret sharing. In this scheme secret information is divided into n shares and distributed among n participants and it is an encryption operation. At least k participants are needed to recover original secret information and it is a decryption operation. Participants less than k cannot recover secret information. Naor and Shamir proposed (k,n) visual cryptography scheme (VCS) to encode secret which is in the image form [4]. In this scheme computational devices are used to encrypt secret image into n shares. Decryption can be done by human visual system after stacking k shares. This scheme is useful if there are no computational devices for decryption. Random-grid based VCS is proposed by Kafri et al. and Shyu [5, 6] to overcome the drawback of pixel expansion of conventional scheme. In this scheme each share acts as random grid.

Multiple Visual Cryptography Secret (MVCS) sharing scheme was proposed to encrypt multiple secrets at a time. Wu and Chen [7] proposed (2,2) MVCS to encrypt two secrets into two square shares SH1 and SH2. The first secret S1 is recovered by stacking two shares SH1 and SH2. The second secret image S2 is recovered by stacking share SH1 with 90° rotated share SH2 [7]. The rotation angle can be of q × 90 where 1 ≤ q ≤ 3. Wu and Chang [8] proposed multi-secret sharing scheme by encrypting secrets in the form of circular shares. Generation of secret S2 can be done by stacking share SH1 with 360° multiple rotated share SH2. In this scheme the limitation of 90, 180, 270° rotation is removed. Shyu et al. [9] proposed MVCS for more than two secrets using two circular shares with different rotation on one of shares. Feng et al. [10] proposed another MVCS scheme for sharing multiple secrets. In this scheme two circular ring shares R1 and R2 are used to encrypt multiple secrets. Some of the other authors who work on multiple secret sharing are Shyu et al. [11], Chang et al. [12], Wu et al. [13].

All the above mentioned schemes for MVCS have many drawbacks. One of the main drawbacks is lack of visual quality of the recovered secret image. The second drawback is distortion of the recovered image from the original image (pixel expansion). These schemes didn’t prepare meaningful shares for users. These meaningful shares are mainly used for identification and management by users and to avoid suspicion of attackers who may focus on meaningless shares.

The disadvantages of meaningless shares can be minimized by using extended visual cryptography scheme (EVCS). It is also called as user-friendly visual cryptography scheme. The EVCS generates meaningful shares by stacking cover images onto meaningless shares. By using EVCS dealers can identify each share easily. Ateniese et al. proposed (k,k)-threshold EVCS which generates meaningful shares using binary images [14]. In this sheme k meaningful shares are generated and all are needed to recover secret image. Fang [15] proposed EVCS for conventional VC with a progressive decryption effect. Here progressive decryption effect means quality of secret image gets improved when number of shares is increased in overlapping. Chen et al. [16] proposed EVCS for random-grid-based techniques. Random-grid based techniques are pixel expansion less schemes. Wang et al. developed an EVCS using matrix extension algorithm which generates random matrix shares instead of meaningless shares [17]. Here shares are matrices which have pixel values of secret image.

Chen and Wu proposed an (n,n) secure Boolean-based multi-secret sharing scheme [18]. In this scheme n shares are generated using n secret images. This scheme mainly uses Boolean-based operations like XOR and bitwise circular shift operation. N shares are required to recover n secrets. Chen and Wu scheme [18] uses random image R in order to randomize the original secret images. It is generated by using two functions XOR operation and bitwise shift operation. This scheme for MVCS faces some drawbacks. The first drawback is generation of meaningless shares in which dealers feel difficulty to manage those shares. The second drawback is to use minimum number of secrets (4 or more) for sharing in order to ensure relative security. If we use two secrets for share generation then shares may have secret information as they are generated using XOR calculation.

This paper proposes extended visual cryptography scheme for multiple secret sharing that develops meaningful shares from multiple secrets and cover images. The proposed scheme uses Boolean-based operations for generating meaningful shares using cover images. Lossless recovery of multiple secrets is achieved using proposed scheme. The proposed scheme is free from pixel expansion. The experimental results of the proposed work shows that MVCS sharing scheme gets improved with meaningful shares.

The organization of this paper is as follows. Proposed scheme is discussed in Sect. 2. Sections 2.1 and 2.2 explains proposed scheme share generation and its recovery, respectively. Section 2.3 discusses on proposed scheme. Section 3 shows experimental results and comparison with related work. Section 4 completes the proposed scheme with conclusion.

2 Proposed Scheme

This section explains proposed work of extended visual cryptography scheme for multi-secret sharing. This scheme generates meaningful shares using multiple secrets and cover images. Boolean based operations are mainly used in this scheme. Lossless recovery of multiple secrets is achieved using the proposed work. Sections 2.1 and 2.2 explains about share generation and secret recovery of the proposed scheme. Section 2.3 discusses on proposed scheme.

2.1 Share Generation

This section explains how to generate meaningful shares using multiple secret images and cover images. The proposed scheme for share generation uses random image generation function which was proposed by Chen and Wu [18]. This random image generating function mainly involves two functions F 1 and F 2. Function F 1 uses XOR operation and function F 2 uses bitwise circular shift operation. The algorithm for share generation is as follows:

  1. 1.

    Let I 1, I 2, …, I n are n multiple secret images that are used as input for share generation.

  2. 2.

    Now random image R 1 is generated using secret images I 1, I 2, …, I n as follows:

    $$\begin{aligned} R_{1} & = F_{1} (F_{2} (I_{1} ,\,I_{2} , \ldots ,I_{n} )); \\ {\text{where}}\;F_{ 2} & = I_{ 1} \oplus I_{ 2} \oplus \ldots \oplus I_{n} ; \\ F_{ 1} & = {\text{bitwise circular shift of}}\;F_{ 2} . \\ \end{aligned}$$
  3. 3.

    Meaningless images M 1, M 2, …, M n , are generated using XOR operation of given multiple secret images with random image R 1 respectively.

  4. 4.

    Now meaningful shares S 1, S 2, …, S k are generated from meaningless images and n cover images C 1, C 2, …, C n using Boolean OR and Boolean AND operations as follows:

    $$\begin{aligned} S_{1} & = M_{1} \otimes C_{1} \\ S_{2} & = M_{1}\,\odot\,C_{1} \\ S_{3} & = C_{1} \\ S_{4} & = M_{2} \otimes C_{2} \\ S_{5} & = M_{2} \odot C_{2} \\ S_{6} & = C_{2} \\ \vdots \\ S_{k - 2} & = M_{n} \otimes C_{n} \\ S_{k - 1} & = M_{n} \odot C_{n} \\ S_{n} & = C_{n} \\ \end{aligned}$$

    where 1 ≤ k ≤ 3 × n

  5. 5.

    Finally k meaningful shares are generated for the given multiple secret images.

Figure 1 shows share generation phase of the proposed scheme. In this phase n multiple secret images I 1, I 2, …, I n are used. A random image is generated from these secret images using random image generation function. Then N meaningless images M 1, M 2, …, M n are generated by applying XOR operation on the secret images and random image. Finally, K meaningful shares S 1, S 2, …, S k are developed by performing Boolean operations AND, OR between meaningless images and cover images.

Fig. 1
figure 1

N meaningful share images generation from n secret images

2.2 Secret Images Recovery Procedure

The recovery procedure uses k meaningful share images from share generation as an input for recovering original secret images. Boolean XOR operation is used on these shares to generate n meaningless shares. Random image R 1 is generated from these meaningless share images using random image generating function. Finally n secret images are recovered by applying Boolean XOR operation between random image and meaningless shares. The algorithm for secret images recovery is as follows:

  1. 1.

    Recover meaningless shares \(M_{1} ,\,M_{2} ,\, \cdots ,\,M_{n}\) from k meaningful shares as follows:

    $$\begin{aligned} M_{1} & = S_{1} \oplus S_{2} \oplus S_{3} ; \\ M_{2} & = S_{4} \oplus S_{5} \oplus S_{6} ; \\ \vdots \\ M_{n} & = S_{k - 2} \oplus S_{k - 1} \oplus S_{k} ; \\ \end{aligned}$$

    where 1 ≤ k ≤ 3 × n

  2. 2.

    Random image \(R_{1}\) is generated using meaningful shares.

  3. 3.

    Finally, n secret images \(I_{1} ,\,I_{2} ,\, \cdots ,\,I_{n}\) are generated as follows:

    $$\begin{aligned} I_{1} & = M_{1} \oplus R_{1} ; \\ I_{2} & = M_{2} \oplus R_{1} ; \\ \vdots \\ I_{n} & = M_{n} \oplus R_{1} ; \\ \end{aligned}$$

2.3 Discussion on Proposed Scheme

The proposed scheme develops (k,k) multi-secret sharing with user-friendly visual cryptography. It generates k shares for multiple secrets (2 or more). K shares are needed to recover all secret images. It doesn’t require code book for generating meaningful shares. These meaningful shares are generated using simple Boolean operations. So this scheme requires less CPU computation time. Moreover the proposed scheme achieved lossless recovery of multiple secret images. The two drawbacks of Chen and Wu [18] scheme can be overcome by using the proposed method for multi-secret sharing. The developed scheme generates meaningful shares and it can encrypt 2 or more secrets in a more secure manner.

3 Experimental Results

This section discusses about the proposed method experimental results and its comparison with related work. We used Matlab R2010a on a computer with Windows 7 operating system, Intel core I3 processor and 4 GB RAM for implementing the proposed work.

3.1 Results with 2 Secrets

Figure 2 shows experimental results of the proposed work. Here we took two secret images: Pepper, Barbara and two cover images: Lena, Cameraman. All these images are of 512 × 512 size. Figure 2e–j shows the meaningful shares generated by applying proposed work share generation operation. Figure 2k, l shows recovered secret images generated by applying secret recovery procedure. Lossless recovery of the secret images is achieved with meaningful shares.

Fig. 2
figure 2

Two secret images (a, b), two cover images (c, d), six meaningful shares (ej), recovered images (k, l)

Peak Signal-to-Noise Ratio (PSNR) is the accuracy measure for the image quality of generated shares. Table 1 shows PSNR values between share images and original images. In general, PSNR value of any image to be visible is more than 30 dB. The proposed work achieved PSNR value of the recovered images approaches to infinite which means that lossless recovery of secret images. Meaningful shares generated by the proposed scheme have PSNR values more than 50 dB. So the generated shares can be easily managed by the dealer as they are visible to human visual system. In this way proposed method works as extended visual cryptography scheme for multiple secret sharing.

Table 1 PSNR values between share images and original images

3.2 Comparison of the Proposed Method with Related Schemes

This section explains the comparison between the proposed work and the related schemes. Comparison is made in different areas like: share shape, shareable secrets, quality of share, recovery type, and pixel expansion. Share shape indicates type of generated share like square, rectangle, and circle. Shareable secrets mean number of secrets that can be shareable by using the scheme. Quality of share explains about generated share visual quality. Recovery type indicates that how secret images are recovered for the scheme. Pixel expansion explains about distortion of recovered image from the original image.

Table 2 indicates how proposed scheme achieved better sharing for multiple secret images. It generates square shape share images which are mainly used in image processing. It can share multiple secrets without distortion which is not possible for schemes of [810, 19, 20]. The most important property of the proposed method is meaningful share generation which is impossible for all other schemes. Lossless recovery of all the secrets is only possible with the proposed scheme and Chen and Wu [18] scheme. From all the comparisons we found that the proposed work is better useful scheme for multiple secret sharing.

Table 2 Comparison between related works and the proposed method

4 Conclusion

In this paper we proposed a novel algorithm for meaningful share generation of multiple secret sharing scheme. The experimental results show that proposed scheme is a better suitable scheme for multi-secret sharing than previous approaches. It also indicates that lossless recovery of multiple secrets is achieved with our scheme. As the scheme requires only Boolean based operations it is computationally costless scheme. There are many advantages applicable for the proposed work. The first one is generating meaningful shares which enable dealers to manage the shares effectively. The second one is its distortion free recovery of multiple secrets. The third one is its ability to share many secrets. The main contribution of our proposed work is applying extended visual cryptography scheme or user-friendly cryptography for the multi-secret sharing schemes with lossless recovery of secrets.