Abstract
Digital images are among the most communicated multimedia data types. Many of these images include private data that require a high level of security. The traditional image security schemes rely on cryptographic solutions to ensure the confidentiality or the authentication of image contents, and to ensure that the encryption key is not compromised. However, the continuous evolution of the attackers’ capabilities is making it harder than ever to achieve the goal of safeguarding the private data against breaches. Moreover, the centralization aspect of images’ storage makes them prone to availability attacks. In this paper, we propose a distributed and secure storage scheme for images, based on the Modified Information Dispersal Algorithm (MIDA), and taking into consideration the trade-off between the high security level and the associated computational overhead. The proposed solution applies block permutation on the image to ensure data confidentiality and then, divides it into k fragments that are encoded using the proposed parallel modified IDA. The output consists of n encoded fragments, instead of k, to ensure data availability. Next, each encoded fragment is authenticated using a lightweight Message Authentication Algorithm (MAA) to ensure data integrity with source authentication. Finally, the encoded fragments are distributed over n storage nodes (or multi-cloud providers). The resilience degree of such redundancy is (n − k), since only k fragments are required to reconstruct the original images. All the cryptographic steps such as permutation, IDA encoding and MAA consist of simple operations and they are based on a dynamic key. This ensures a high level of security since in each session, a new key is used to produce different cryptographic primitives as well as the update primitives, which are used to update the permutation and selection tables. The implementation results show that the proposed scheme meets the desired cryptographic properties to guard against different attacks. Finally, the performance tests show that the proposed scheme is lightweight with low overhead in terms of computations, communication and storage.
Similar content being viewed by others
References
Adi S (1979) How to share a secret. Commun ACM 22(11):612–613
Ahmadian AM, Amirmazlaghani M (2019) A novel secret image sharing with steganography scheme utilizing optimal asymmetric encryption padding and information dispersal algorithms. Signal Processing, Image Communication 74:78–88
Anonymized (2016) Poster: a keyless efficient algorithm for data protection by means of fragmentation. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, CCS’16. ACM, New York, pp 1745–1747
Bao L, Yi S, Zhou Y (2017) Combination of sharing matrix and image encryption for lossless (k,n)-secret image sharing. IEEE Trans Image Process 26(12):5618–5631
Barker EB, Kelsey JM (2011) Recommendation for random number generation using deterministic random bit generators (revised). US Department of Commerce, Technology Administration, National Institute of Standards and Technology, Computer Security Division, Information Technology Laboratory
Blakley GR (1899) Safeguarding cryptographic keys. In: afips. IEEE, p 313
Blundo C, Bonis AD, De Santis A (2001) Improved schemes for visual cryptography . Designs, Codes and Cryptography 24(3):255–278
Cimato S, Yang C-N (2017) Visual cryptography and secret image sharing. CRC Press, Boca Raton
Cincilla P, Boudguiga A, Hadji M, Kaiser A (2015) Light blind: why encrypt if you can share?. In: 2015 12th international joint conference on e-business and telecommunications (ICETE), vol 04, pp 361–368
Daemen J, Rijmen V (2013) The design of Rijndael: AES-the advanced encryption standard. Springer, Berlin
Dwivedi AD, Morawiecki P, Singh R, Dhar S (2018) Differential-linear and related key cryptanalysis of round-reduced scream. Inf Process Lett 136:5–8
Fabre J-C, Deswarte Y, Randell B (1994) Designing secure and reliable applications using fragmentation-redundancy-scattering: an object-oriented approach. Springer, Berlin, pp 21–38
Guo C, Chang C-C, Qin C (2012) A hierarchical threshold secret image sharing. Pattern Recogn Lett 33(1):83–91
Hore A, Ziou D (2010) Image quality metrics: Psnr vs. ssim. In: 2010 20th international conference on pattern recognition (icpr). IEEE, pp 2366–2369
Hou Y-C (2003) Visual cryptography for color images. Pattern Recogn 36 (7):1619–1629
Hugo K (1994) Secret sharing made short. In: Proceedings of the 13th annual international cryptology conference on advances in cryptology, CRYPTO’93. Springer, London, pp 136–146
Kapusta K, Memmi G, Noura H (2016) Poster: a keyless efficient algorithm for data protection by means of fragmentation. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security. ACM, pp 1745–1747
Kapusta K, Memmi G, Noura H (2017) Secure and resilient scheme for data protection in unattended wireless sensor networks. In: Cyber security in networking conference (CSNet), 2017 1st. IEEE, pp 1–8
Kapusta K, Memmi G, Noura H (2017) Secure and resilient scheme for data protection in unattended wireless sensor networks. In: 1st cyber security in networking conference, CSNet 2017, Rio de Janeiro, Brazil, October 18-20, 2017, pp 1–8
Lee K-H, Chiu P-L (2014) Digital image sharing by diverse image media. IEEE Trans Inform Forensics Secur 9(1):88–98
Li M (2012) On the confidentiality of information dispersal algorithms and their erasure codes. CoRR arXiv:1206.4123
Li P, Yang C-N, Wu C-C, Kong Q, Ma Y (2013) Essential secret image sharing scheme with different importance of shadows. J Vis Commun Image Represent 24(7):1106–1114
Lin C-C, Tsai W-H (2003) Visual cryptography for gray-level images by dithering techniques. Pattern Recogn Lett 24(1-3):349–358
Lukac R, Plataniotis KN (2005) Bit-level based secret sharing for image encryption. Pattern Recogn 38(5):767–772
Massoudi A, Lefebvre F, De Vleeschouwer C, Macq B, Quisquater J-J (2008) Overview on selective encryption of image and video: challenges and perspectives. Eurasip Journal on Information Security 2008(1):179290
Mostefaoui A, Noura H, Fawaz Z (2015) An integrated multimedia data reduction and content confidentiality approach for limited networked devices. Ad Hoc Netw 32:81–97
Naor M, Shamir A (1994) Visual cryptography. In: Workshop on the theory and application of of cryptographic techniques. Springer, Berlin, pp 1–12
Naor M, Shamir A (2017) Visual cryptography [j/ol]. Lect Notes Comput Sci 950(1):1–12
Noura H, Chehab A, Noura M, Couturier R, Mansour MM (2018) Lightweight, dynamic and efficient image encryption scheme. Multimed Tools Appl, pp 1–35
Noura H, Chehab A, Sleem L, Noura M, Couturier Rl, Mansour MM (2018) One round cipher algorithm for multimedia iot devices. Multimed Tools Appl, pp 1–31
Noura H, Couroussé D (2015) Lightweight, dynamic, and flexible cipher scheme for wireless and mobile network. In: International conference on ad hoc networks. Springer, pp 225–236
Noura H, Hussein S, Martin S, Boukhatem L, Agha KA (2015) Erdia: an efficient and robust data integrity algorithm for mobile and wireless networks. In: 2015 IEEE wireless communications and networking conference (WCNC). 2103–2108, IEEE
Noura H, Martin S, Agha KA, Chahine K (2014) Erss-rlnc: efficient and robust secure scheme for random linear network coding. Computer Networks 75:Part A:99–112
Noura H, Melki R, Chehab A, Mansour MM, Martin S (2018) Efficient and secure physical encryption scheme for low-power wireless m2m devices. In: 2018 14th international wireless communications & mobile computing conference (IWCMC). IEEE, pp 1267–1272
Noura H, Sleem L, Noura M, Mansour M M, Chehab A, Couturier R (2017) A new efficient lightweight and secure image cipher scheme. Multimed Tools Appl, pp 1–28
Noura HN, Chehab A, Couturier R (2019) Efficient & secure cipher scheme with dynamic key-dependent mode of operation. Signal Process Image Commun 78:448–464
Noura HN, Noura M, Chehab A, Mansour M M, Couturier R (2018) Efficient and secure cipher scheme for multimedia contents. Multimed Tools Appl, pp 1–30
Paar C, Pelzl J (2009) Understanding cryptograph: a textbook for students and practitioners, 1st edn. Springer Publishing Company, Incorporated, Berlin
Paul G, Maitra S (2011) RC4 stream cipher and its variants. CRC Press, Boca Raton
Rabi MO (1989) Efficient dispersal of information for security, load balancing, and fault tolerance. J ACM 36(2):335–348
Resch JK, Plank JS (2011) Aont-rs: blending security and performance in dispersed storage systems. In: Proceedings of the 9th USENIX conference on file and Stroage technologies, FAST’11. USENIX Association, Berkeley, pp 14–14
Rivest RL (1997) All-or-nothing encryption and the package transform. Springer, Berlin, pp 210–218
Shankar K, Elhoseny M, Satheesh Kumar R, Lakshmanaprabu SK, Yuan X (2018) Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. Journal of Ambient Intelligence and Humanized Computing, pp 1–13
Shi R, Zhong H, Huang L, Luo Y (2008) A (t, n) secret sharing scheme for image encryption. In: 2008 Congress on image and signal processing, vol 3. IEEE, pp 3–6
Shyu SJ (2006) Efficient visual secret sharing scheme for color images. Pattern Recogn 39(5):866–880
Stallings W (2017) Cryptography and network security: principles and practice. Pearson Upper Saddle River, NJ
Thien C-C, Lin J-C (2002) Secret image sharing. Computers & Graphics 26 (5):765–770
Ulutas G, Ulutas M, Nabiyev VV (2013) Secret image sharing scheme with adaptive authentication strength. Pattern Recogn Lett 34(3):283–291
Verheul ER, Van Tilborg HCA (1997) Constructions and properties of k out of n visual secret sharing schemes. Des Codes Crypt 11(2):179–196
Wang Z, Bovik A C, Sheikh H R, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Transactions on Image Processing 13(4):600–612
Wei S-C, Hou Y-C, Lu Y-C (2015) A technique for sharing a digital image. Computer Standards & Interfaces 40:53–61
Wu X, Weng J, Yan WQ (2018) Adopting secret sharing for reversible data hiding in encrypted images. Signal Process 143:269–281
Yan X, Wang S, El-Latif AAA, Niu X (2015) Visual secret sharing based on random grids with abilities of and and xor lossless recovery. Multimed Tools Appl 74(9):3231–3252
Yang C-N, Huang S-M (2010) Constructions and properties of k out of n scalable secret image sharing. Opt Commun 283(9):1750–1762
Yang C-N, Laih C-S (2000) New colored visual secret sharing schemes. Designs, Codes and Cryptography 20(3):325–336
Acknowledgements
This paper is partially supported with funds from the Maroun Semaan Faculty of Engineering and Architecture at the American University of Beirut and also from the EIPHI Graduate School (contract “ANR-17-EURE-0002”). We also thank the supercomputer facilities of the Mésocentre de calcul de Franche-Comté.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Noura, H., Noura, M., Salman, O. et al. Efficient & secure image availability and content protection. Multimed Tools Appl 79, 22869–22904 (2020). https://doi.org/10.1007/s11042-020-09057-4
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-09057-4