Secret image sharing scheme with authentication and remedy abilities based on cellular automata and discrete wavelet transform

被引:16
|
作者
Wu, Xiaotian [1 ]
Sun, Wei [2 ]
机构
[1] Sun Yat Sen Univ, Sch Informat Sci & Technol, Guangzhou 510006, Guangdong, Peoples R China
[2] Sun Yat Sen Univ, Sch Software, Guangzhou 510006, Guangdong, Peoples R China
关键词
Secret image sharing; Authentication; Remedy; Cellular automata; Discrete wavelet transform; STEGANOGRAPHY;
D O I
10.1016/j.jss.2012.11.021
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
A meaningful secret image sharing scheme with authentication and remedy abilities is proposed in this paper. One dimensional cellular automata, discrete wavelet transform and hash function are adopted in the proposed scheme. The stego images are allowed to be verified to determine whether they are tampered or not. Once the stego images are tampered, shared bits retrieved from these tampered areas cannot be used to reconstruct the secret image. Instead, those damaged areas in the secret image can be repaired by the hidden information. Experimental results exhibit that low computation cost, high tamper detection rate and advanced remedy ability against tampering and cropping attacks are achieved by the proposed scheme. (C) 2013 Published by Elsevier Inc.
引用
收藏
页码:1068 / 1088
页数:21
相关论文
共 50 条
  • [1] A scalable secret image sharing method based on discrete wavelet transform
    Kong, Jun
    Zhang, Yanfen
    Meng, Xiangbo
    Zheng, Ying
    Lu, Yinghua
    BIO-INSPIRED COMPUTATIONAL INTELLIGENCE AND APPLICATIONS, 2007, 4688 : 736 - 745
  • [2] A secret sharing scheme based on cellular automata
    del Rey, AM
    Mateus, JP
    Sánchez, GR
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 170 (02) : 1356 - 1364
  • [3] Meaningful secret sharing technique with authentication and remedy abilities
    Chang, Chin-Chen
    Chen, Yi-Hui
    Wang, Hsin-Chi
    INFORMATION SCIENCES, 2011, 181 (14) : 3073 - 3084
  • [4] A color image watermarking scheme based on secret sharing and wavelet transform
    Hsieh, Shang-Lin
    Ran, Jh-Jie
    Tsai, I-Ju
    Huang, Bin-Yuan
    2007 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-8, 2007, : 2952 - 2957
  • [5] DWT-SISA: a secure and effective discrete wavelet transform-based secret image sharing with authentication
    Xiong, Lizhi
    Zhong, Xinwei
    Yang, Ching-Nung
    SIGNAL PROCESSING, 2020, 173
  • [6] Secret image sharing based on cellular automata and steganography
    Eslami, Z.
    Razzaghi, S. H.
    Ahmadabadi, J. Zarepour
    PATTERN RECOGNITION, 2010, 43 (01) : 397 - 404
  • [7] A cellular automata-based multi-stage secret image sharing scheme
    Jamal Zarepour-Ahmadabadi
    MohammadEbrahim Shiri-Ahmadabadi
    Alimohammad Latif
    Multimedia Tools and Applications, 2018, 77 : 24073 - 24096
  • [8] A cellular automata-based multi-stage secret image sharing scheme
    Zarepour-Ahmadabadi, Jamal
    Shiri-Ahmadabadi, MohammadEbrahim
    Latif, Alimohammad
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (18) : 24073 - 24096
  • [9] Novel Reversible Image Secret Sharing Based on Thien and Lin's Scheme using Discrete Haar wavelet Transform
    Thepade, Sudeep D.
    Patil, Rupali S.
    2015 INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING (ICPC), 2015,
  • [10] DWTAT-DASIS: Fusion of discrete wavelet transform and access tree for distributed authentication in secret image sharing
    Cai, Chuanda
    Peng, Changgen
    Tang, Hanlin
    Xiao, Bin
    Tan, Weijie
    COMPUTER STANDARDS & INTERFACES, 2025, 93