A Novel Image Secret Sharing Scheme without Third-Party Scrambling Method

被引:4
作者
Hu, Weitong [1 ]
Yao, Ye [1 ]
Zhou, Di [2 ]
Zheng, Qiuhua [1 ]
Choo, Kim-Kwang Raymond [3 ]
机构
[1] Hangzhou Dianzi Univ, Sch Cyberspace, Hangzhou 310018, Zhejiang, Peoples R China
[2] Zhejiang Univ Technol Co Ltd, Hangzhou 310018, Zhejiang, Peoples R China
[3] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
基金
中国国家自然科学基金;
关键词
Image secret sharing; Scrambling method; Cellular automata; CELLULAR-AUTOMATA; AUTHENTICATION; STEGANOGRAPHY; ENCRYPTION;
D O I
10.1007/s11036-018-1168-y
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Values such as cellular sum in initial configurations and neighbor radius can potentially affect confusion and diffusion in cellular automata. Specifically, both confusion and diffusion characteristics in cellular automata usually are not sufficient to break up the high correlation between the secret image pixels when these two parameters are too small. Thus, using only One-Dimensional Reversible Memory Cellular Automata (ODRM-CA) to generate shadow images will lead to the leakage of original secret image's information by some shadow images. In order to solve this problem, in this paper, we propose an image secret sharing (ISS) scheme with no third-party scrambling method. This is realized by increasing the values of cellular sum and neighbor radius to implement the scrambling process for the secret image, thus both processes of image scrambling and image secret sharing can be achieved by ODRM-CA. Experimental results show that this scheme can generate strong random shadow images to avoid leaking information of the original secret image.
引用
收藏
页码:1317 / 1335
页数:19
相关论文
共 27 条
[1]  
[Anonymous], 2017, ARXIV170908025
[2]   Combination of Sharing Matrix and Image Encryption for Lossless (k, n)-Secret Image Sharing [J].
Bao, Long ;
Yi, Shuang ;
Zhou, Yicong .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2017, 26 (12) :5618-5631
[3]  
Blakley G. R., 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK), P313, DOI 10.1109/MARK.1979.8817296
[4]   Wheeled mobile robot design with robustness properties [J].
Chen, Yung Yue ;
Chen, Yung Hsiang ;
Huang, Chiung Yau .
ADVANCES IN MECHANICAL ENGINEERING, 2018, 10 (01)
[5]   Secret image sharing with authentication-chaining and dynamic embedding [J].
Eslami, Z. ;
Ahmadabadi, J. Zarepour .
JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (05) :803-809
[6]   A verifiable multi-secret sharing scheme based on cellular automata [J].
Eslami, Z. ;
Ahmadabadi, J. Zarepour .
INFORMATION SCIENCES, 2010, 180 (15) :2889-2894
[7]   Secret image sharing based on cellular automata and steganography [J].
Eslami, Z. ;
Razzaghi, S. H. ;
Ahmadabadi, J. Zarepour .
PATTERN RECOGNITION, 2010, 43 (01) :397-404
[8]   Deep Convolutional Neural Networks for Hyperspectral Image Classification [J].
Hu, Wei ;
Huang, Yangyu ;
Wei, Li ;
Zhang, Fan ;
Li, Hengchao .
JOURNAL OF SENSORS, 2015, 2015
[9]   Reversible secret image sharing with steganography and dynamic embedding [J].
Hu, Wei-Tong ;
Li, Ming-Chu ;
Guo, Cheng ;
Ren, Yi-Zhi .
SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (11) :1267-1276
[10]   On the Security of Permutation-Only Image Encryption Schemes [J].
Jolfaei, Alireza ;
Wu, Xin-Wen ;
Muthukkumarasamy, Vallipuram .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (02) :235-246