DWTAT-DASIS: Fusion of discrete wavelet transform and access tree for distributed authentication in secret image sharing

被引:0
|
作者
Cai, Chuanda [1 ]
Peng, Changgen [1 ]
Tang, Hanlin [2 ]
Xiao, Bin [2 ]
Tan, Weijie [1 ,3 ]
机构
[1] Guizhou Univ, State Key Lab Publ Big Data, Guiyang 550025, Peoples R China
[2] Guizhou ShuJuBao Network Technol Co Ltd, Guiyang 550025, Peoples R China
[3] Guizhou Univ, Minist Educ, Key Lab Adv Mfg Technol, Guiyang 550025, Peoples R China
基金
中国国家自然科学基金;
关键词
Distributed storage; Discrete wavelet transform; Secret image sharing; Signature certification; VISUAL CRYPTOGRAPHY; MEANINGFUL; SCHEME;
D O I
10.1016/j.csi.2024.103969
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Secret sharing of distributed data in cloud environments prevents unauthorized and wanton access and misuse by malicious participants. However, when applying secret sharing to image formats, the fixed range of pixel values in images presents unique challenges for share recovery, often resulting in recovery algorithms that reconstruct images in a lossy manner. Moreover, one-way authentication methods for participants in cloud environments are insufficient to address the heightened security demands of high-trust scenarios. This paper presents a secret image-sharing scheme with distributed authentication (DWTAT-DASIS) designed for cloud storage environments. By leveraging Discrete Wavelet Transform and an Access Tree structure, the scheme addresses the limitations of existing approaches (such as compression-based secret sharing and visual cryptography), which fail to provide lossless image recovery and efficient performance. Additionally, DWTATDASIS enhances security through fine-grained access control and two-way authentication. Finally, security analysis and experiments were conducted on the proposed protocol, demonstrating its ability to resist common attack methods as well as some deeper-level attack methods, meeting the security requirements for image storage in cloud systems. Experimental analysis shows that compared with similar protocols, this protocol can ensure the integrity of image restoration and greatly reduce the probability of image transmission being attacked.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] Secret image sharing scheme with authentication and remedy abilities based on cellular automata and discrete wavelet transform
    Wu, Xiaotian
    Sun, Wei
    JOURNAL OF SYSTEMS AND SOFTWARE, 2013, 86 (04) : 1068 - 1088
  • [2] A scalable secret image sharing method based on discrete wavelet transform
    Kong, Jun
    Zhang, Yanfen
    Meng, Xiangbo
    Zheng, Ying
    Lu, Yinghua
    BIO-INSPIRED COMPUTATIONAL INTELLIGENCE AND APPLICATIONS, 2007, 4688 : 736 - 745
  • [3] DWT-SISA: a secure and effective discrete wavelet transform-based secret image sharing with authentication
    Xiong, Lizhi
    Zhong, Xinwei
    Yang, Ching-Nung
    SIGNAL PROCESSING, 2020, 173
  • [4] Dual tree Discrete Wavelet Transform with application to image fusion
    Ray, Lee A.
    Adhami, Reza R.
    PROCEEDINGS OF THE THIRTY-EIGHTH SOUTHEASTERN SYMPOSIUM ON SYSTEM THEORY, 2004, : 430 - 433
  • [5] Image fusion using dual tree discrete wavelet transform and weights optimization
    Aghamaleki, Javad Abbasi
    Ghorbani, Alireza
    VISUAL COMPUTER, 2023, 39 (03): : 1181 - 1191
  • [6] Image fusion using dual tree discrete wavelet transform and weights optimization
    Javad Abbasi Aghamaleki
    Alireza Ghorbani
    The Visual Computer, 2023, 39 : 1181 - 1191
  • [7] A secret image sharing method using integer wavelet transform
    Huang, Chin-Pan
    Li, Ching-Chung
    EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2007, 2007 (1)
  • [8] A Secret Image Sharing Method Using Integer Wavelet Transform
    Chin-Pan Huang
    Ching-Chung Li
    EURASIP Journal on Advances in Signal Processing, 2007
  • [9] Discrete Wavelet Transform based Watermarking for Image Content Authentication
    Ur-Rehman, Obaid
    Zivic, Natasa
    ICPRAM: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION APPLICATIONS AND METHODS, 2017, : 620 - 625
  • [10] Integer wavelet transform-based secret image sharing using rook polynomial and hamming code with authentication
    Charoghchi, Sara
    Saeidi, Zahra
    Mashhadi, Samaneh
    CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY, 2024, 9 (06) : 1435 - 1450