RETRACTED: Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique (Retracted Article)

被引:41
作者
Shankar, K. [1 ]
Elhoseny, Mohamed [2 ]
Kumar, R. Satheesh [3 ]
Lakshmanaprabe, S. K. [4 ]
Yuan, Xiaohui [5 ]
机构
[1] Kalasalingam Acad Res & Educ, Sch Comp, Krishnankoil, India
[2] Mansoura Univ, Fac Comp & Informat, Mansoura, Egypt
[3] Sahrdaya Coll Engn & Technol, Dept Comp Sci & Engn, Kodakara, Kerela, India
[4] BS Abdur Rahman Crescent Inst Sci & Technol, Dept Elect & Instrumentat Engn, Chennai, Tamil Nadu, India
[5] Univ North Texas, Dept Comp Sci & Engn, Denton, TX 76203 USA
关键词
Secret image sharing; Shadow; Homomorphic encryption; Discrete wavelet transform; Harmony search (OHS) algorithm; PSNR; ELLIPTIC CURVE CRYPTOGRAPHY; VISUAL CRYPTOGRAPHY; EFFICIENT; CREATION;
D O I
10.1007/s12652-018-1161-0
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Secret Image Sharing (SIS) scheme is to encrypt a secret image into 'n' specious shadows. It is unable to reveal any data on the secret image if at least one of the shadows is not achieved. In this paper, wavelet-based secret image sharing scheme is proposed with encrypted shadow images using optimal Homomorphic Encryption (HE) technique. Initially, Discrete Wavelet Transform (DWT) is applied on the secret image to produce sub bands. From this process, multiple shadows are created, encrypted and decrypted for each shadow. The encrypted shadow can be recovered just by choosing some subset of these 'n' shadows that makes transparent and stack over each other. To improve the shadow security, each shadow is encrypted and decrypted using HE technique. For the concern on image quality, the new Oppositional based Harmony Search (OHS) algorithm was utilized to generate the optimal key. From the analysis, it shows that the proposed scheme provide greater security compared to other existing schemes.
引用
收藏
页码:1821 / 1833
页数:13
相关论文
共 50 条
  • [1] [Anonymous], INT J COMPUT SCI MOB
  • [2] [Anonymous], 2016, P INT C COMP COMM CO
  • [3] [Anonymous], INT J ADV RES COMPUT
  • [4] [Anonymous], INT J COMPUT APPL
  • [5] [Anonymous], INT J ADV RES COMPUT
  • [6] [Anonymous], 2015, AUST J BASIC APPL SC
  • [7] [Anonymous], INT J NETW SECUR APP
  • [8] [Anonymous], 2018, International Journal of Engineering & Technology, DOI DOI 10.14419/IJET.V7I1.9.9729
  • [9] [Anonymous], INT J COMPUT SCI MOB
  • [10] [Anonymous], INT J COMPUT APPL