A novel meaningful secret image sharing method based on Arabic letters

Derya Avci


In recent years, the providing of information security for multimedia has become an important subject of study. Visual cryptography and secret sharing is protected image contents without using complex mathematically operators. Thus, visual cryptography and secret sharing are widely used. In this paper, Letter based Secret Image Sharing (LSIS) for protecting of image contents. For this purpose, secret sharing and data hiding algorithms are used together in this LSIS method. The LSIS method consists of two parts. These are generating of meaningful secret sharing and data hiding. Secret sharing and visual cryptography methods commonly generate noise-like images. The noise-like images have attracted the attention of the attackers and several attacks have been developed to break these encrypted images. To prevent these attacks, meaningful secret shares are generated and these secret shares are embedded into cover image. In this paper, we proposed a novel secret image sharing method based on Arabic letters. The proposed method is used Arabic letters for generating meaningful secret shares and data hiding functions are used for camouflage. RGB images are used for cover images. In proposed method, secret shares are embedded into R, G and B channels respectively. Thus, cheatingsĀ  occurred in visual cryptography are prevented.


Meaningful secret image sharing; data hiding; visual cryptography; information security.

Full Text:



Ateniese, G., Blundo, C., De Santis, A. & Stinson, D.R. (1996).

Visual cryptography for general access structures. Information and

Computation, 129:86106.

Bharanivendhan, N. & Amitha, T. (2014). Visual cryptography

schemes for secret image sharing using GAS Algorithm. International

Journal of Computer Applications, 92(8):11-16

Blundo, C., Cimato, S. & De Santis, A. (2006). Visual cryptography

schemes with optimal pixel expansion. Theoretical Computer Science,


Chiu, P.L. & Lee, K.H. (2015). User-friendly threshold visual

cryptography with complementary cover images. Signal Processing,


Choi, Y. & Aizawa, K. (2002). Digital watermarking technique using

block correlation of DCT coefficients. Electronics and Communications

in Japan (Part II: Electronics), 85(9):2331.

Choi, K.S. (2013). Bit plane modification for improving MSEnear

optimal DPCM-based block truncation coding. Digital Signal

Processing, 23(4):1171-1180.

DArco, P., De Prisco, R. & De Santis, A. (2014). Measureindependent

characterization of contrast optimal visual cryptography

schemes. Journal of Systems and Software, 95:89-99.

Gutub, A., Ghouti, L., Elarian, Y., Awaideh, S. & Alvi, A. (2010).

Utilizing diacritic marks for arabic text steganography. Kuwait Journal

of Science & Engineering, 37(1):89-109.

Govind, P.V.S. & Wilscy, M. (2015). A new reversible data hiding scheme with improved capacity based on directional interpolation and

difference expansion. Procedia Computer Science, 46:491-498.

Hussain, I. (2013). A novel approach of audio watermarking based on

image-box transformation. Mathematical and Computer Modelling,


Khamrui, A. & Mandal, J.K. (2013). A genetic algorithm based

steganography using discrete cosine transformation (GASDCT).

Procedia Technology, 10:105-111.

Lee, S.H. (2014). DWT based coding DNA watermarking for DNA

copyright protection. Information Sciences, 273:263-286.

Lin, C.C., Liu, X.L. & Yuan, S.M. (2015). Reversible data hiding

for VQ-compressed images based on search-order coding and statecodebook

mapping. Information Sciences, 293:314-326.

Lin, Y.K. (2014). A data hiding scheme based upon DCT coefficient

modification. Computer Standards & Interfaces, 36(5):855-862.

Lin, H.C., Yang, C.N., Laih, C.S. & Lin, H.T. (2013). Natural

language letter based visual cryptography scheme. Journal of Visual

Communication and Image Representation, 24(3):318-331.

Lin, P.Y., Wang, R.Z., Chang, Y.J. & Fang, W.P. (2015). Prevention

of cheating in visual cryptography by using coherent patterns.

Information Sciences, 301:61-74.

Liu, Y. & Zhao, J. (2010). A new video watermarking algorithm based

on 1D DFT and Radon transform. Signal Processing, 90(2):626-639.

Liu, J.F., Tian, Y.G., Han, T., Yang, C.F. & Liu, W.B. (2015). LSB

steganographic payload location for JPEG-decompressed images.

Digital Signal Processing, 38:66-76.

Lou, D.C. & Hu, C.H. (2012). LSB steganographic method based on

reversible histogram transformation function for resisting statistical

steganalysis. Information Sciences, 188:346-358.

Mandal, J.K. (2012). Watermarking in transform domains (WTD).

Procedia Technology, 4:19-26.

Nair, N.S., Mathew, T.A., Neethu, S., Viswanath, V.P., Nair, M. S. et

al. (2015). A proactive approach to reversible data hiding in encrypted

images. Procedia Computer Science, 46:1510-1517.

Nazari, S., Moghadam, A.M.E. & Moin, M.S. (2015). A novel image

steganography scheme based on morphological associative memory

and permutation schema. Security and Communication Networks,


Naor, M. & Shamir, A. (1994). Visual cryptography, in: A. DeSantis

(Ed.), Advances in Cryptology EUROCRYPT94. Lecture Notes in

Computer Science, Perugia, Italy, 950:112.

Ou, D., Sun, W. & Wu, X. (2015). Non-expansible XOR-based visual

cryptography scheme with meaningful shares. Signal Processing, 108:


Parvez, M.T. & Gutub, A.A. (2011). Vibrant color image steganography

using channel differences and secret data distribution. Kuwait Journal

of Science and Engineering, 38(1B):127-142.

SIPI Image Dataset, University of Southern California, signal and

image processing institute. Available online: http://sipi.usc.edu/

database (05.01.2016).

Tanchenko, A. (2014). Visual-PSNR measure of image quality. Journal

of Visual Communication and Image Representation, 25(5):874-878.

Veerappan, J. & Pitchammal, G. (2012). Interpolation based image

watermarking using segmentation resisting to geometrical attacks.

Procedia Engineering, 38:3528-3540.

Yang, C.N. & Lin, C.Y. (2015). Almost-aspect-ratio-invariant visual

cryptography without adding extra subpixels. Information Sciences,


Yan, X., Wang, S., Niu, X. & Yang, C.N. (2015). Generalized random

grids-based threshold visual cryptography with meaningful shares.

Signal Processing, 109:317-333.

Yan, X., Wang, S., Niu, X. & Yang, C.N. (2015). Halftone visual

cryptography with minimum auxiliary black pixels and uniform image

quality. Digital Signal Processing, 38:53-65.

Yan, X., Wang, S. & Niu, X. (2014). Threshold construction from

specific cases in visual cryptography without the pixel expansion.

Signal Processing, 105:389-398.

Wang, D., Li, X. & Yi, F. (2007). Probabilistic (n, n) visual secret

sharing scheme for grayscale images. In Information Security and

Cryptology. Lecture Notes in Computer Science, 4990:192200.

Wang, D., Zhang, L., Ma, N. & Li, X. (2006). Two secret sharing

schemes based on Boolean operations. Pattern Recognition,


Wu, X. & Sun, W. (2012). Random grid-based visual secret sharing

for general access structures with cheat-preventing ability. Journal of

Systems and Software, 85(5):11191134.


  • There are currently no refbacks.