Secret image sharing scheme with authentication and remedy abilities based on cellular automata and discrete wavelet transform

被引:16
作者
Wu, Xiaotian [1 ]
Sun, Wei [2 ]
机构
[1] Sun Yat Sen Univ, Sch Informat Sci & Technol, Guangzhou 510006, Guangdong, Peoples R China
[2] Sun Yat Sen Univ, Sch Software, Guangzhou 510006, Guangdong, Peoples R China
关键词
Secret image sharing; Authentication; Remedy; Cellular automata; Discrete wavelet transform; STEGANOGRAPHY;
D O I
10.1016/j.jss.2012.11.021
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
A meaningful secret image sharing scheme with authentication and remedy abilities is proposed in this paper. One dimensional cellular automata, discrete wavelet transform and hash function are adopted in the proposed scheme. The stego images are allowed to be verified to determine whether they are tampered or not. Once the stego images are tampered, shared bits retrieved from these tampered areas cannot be used to reconstruct the secret image. Instead, those damaged areas in the secret image can be repaired by the hidden information. Experimental results exhibit that low computation cost, high tamper detection rate and advanced remedy ability against tampering and cropping attacks are achieved by the proposed scheme. (C) 2013 Published by Elsevier Inc.
引用
收藏
页码:1068 / 1088
页数:21
相关论文
共 19 条
[1]  
Aho A. V., 1974, The design and analysis of computer algorithms
[2]   A multisecret sharing scheme for color images based on cellular automata [J].
Alvarez, G. ;
Encinas, L. Hernandez ;
del Rey, A. Martin .
INFORMATION SCIENCES, 2008, 178 (22) :4382-4395
[3]  
[Anonymous], 1979, P AFIPS NAT COMP C N
[4]  
Chan Y.T., 1995, WAVELET BASICS
[5]   Sharing secrets in stego images with authentication [J].
Chang, Chin-Chen ;
Hsieh, Yi-Pei ;
Lin, Chia-Hsuan .
PATTERN RECOGNITION, 2008, 41 (10) :3130-3137
[6]   Meaningful secret sharing technique with authentication and remedy abilities [J].
Chang, Chin-Chen ;
Chen, Yi-Hui ;
Wang, Hsin-Chi .
INFORMATION SCIENCES, 2011, 181 (14) :3073-3084
[7]  
Chih-Ching Thien, 2002, Computers & Graphics, V26, P765, DOI 10.1016/S0097-8493(02)00131-0
[8]   A secret sharing scheme based on cellular automata [J].
del Rey, AM ;
Mateus, JP ;
Sánchez, GR .
APPLIED MATHEMATICS AND COMPUTATION, 2005, 170 (02) :1356-1364
[9]   Secret image sharing based on cellular automata and steganography [J].
Eslami, Z. ;
Razzaghi, S. H. ;
Ahmadabadi, J. Zarepour .
PATTERN RECOGNITION, 2010, 43 (01) :397-404
[10]   Fast search algorithms for vector quantization of images using multiple triangle inequalities and wavelet transform [J].
Hsieh, CH ;
Liu, YJ .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2000, 9 (03) :321-328