Secure and Optimal Secret Sharing Scheme for Color Images

被引:5
作者
Shankar, K. [1 ]
Taniar, David [2 ]
Yang, Eunmok [3 ]
Yi, Okyeon [3 ]
机构
[1] Univ Fed Piaui, Postgrad Program Elect Engn, BR-64049550 Teresina, Brazil
[2] Monash Univ, Fac Informat Technol, Clayton, Vic 3800, Australia
[3] Kookmin Univ, Dept Informat Secur Cryptol & Math, Seoul 02707, South Korea
关键词
multiple secret image sharing; SIMON ciphers; Particle Swarm Optimization; Cuckoo Search Optimization; Peak Signal to Noise Ratio; metaheuristics; PROGRESSIVE K; (T;
D O I
10.3390/math9192360
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Due to contemporary communication trends, the amount of multimedia data created and transferred in 5G networks has reached record levels. Multimedia applications communicate an enormous quantity of images containing private data that tend to be attacked by cyber-criminals and later used for illegal reasons. Security must consider and adopt the new and unique features of 5G/6G platforms. Cryptographic procedures, especially secret sharing (SS), with some extraordinary qualities and capacities, can be conceived to handle confidential data. This paper has developed a secured (k, k) multiple secret sharing (SKMSS) scheme with Hybrid Optimal SIMON ciphers. The proposed SKMSS method constructs a set of noised components generated securely based on performing hash and block ciphers over the secret image itself. The shares are created and safely sent after encrypting them through the Hybrid Optimal SIMON ciphers based on the noised images. This is a lightweight cryptography method and helps reduce computation complexity. The hybrid Particle Swarm Optimization-based Cuckoo Search Optimization Algorithm generates the keys based on the analysis of the peak signal to noise ratio value of the recovered secret images. In this way, the quality of the secret image is also preserved even after performing more computations upon securing the images.
引用
收藏
页数:22
相关论文
共 23 条
[1]   A new Boolean-based multiple secret image sharing scheme to share different sized secret images [J].
Chen, Chien-Chang ;
Chen, Jun-Long .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 33 :45-54
[2]   Highly efficient and secure multi-secret image sharing scheme [J].
Chen, Chien-Chang ;
Wu, Wei-Jie ;
Chen, Jun-Long .
MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (12) :7113-7128
[3]   Privacy-Preserving distributed deep learning based on secret sharing [J].
Duan, Jia ;
Zhou, Jiantao ;
Li, Yuanman .
INFORMATION SCIENCES, 2020, 527 :108-127
[4]   A progressively essential secret image sharing scheme using hierarchy shadow [J].
Hu, Yan-Xiang ;
Liu, Yi-Ning .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 47 :371-376
[5]   Improvement of (n, n)-multi-secret image sharing schemes based on Boolean operations [J].
Kabirirad, Saeideh ;
Eslami, Ziba .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 47 :16-27
[6]   A (t, n)-multi secret image sharing scheme based on Boolean operations [J].
Kabirirad, Saeideh ;
Eslami, Ziba .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2018, 57 :39-47
[7]   An efficient lossless secret sharing scheme for medical images [J].
Kanso, A. ;
Ghebleh, M. .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2018, 56 :245-255
[8]   A construction method of (t, k, n)-essential secret image sharing scheme [J].
Li, Peng ;
Liu, Zuquan ;
Yang, Ching-Nung .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2018, 65 :210-220
[9]   Secret shared multiple-image encryption based on row scanning compressive ghost imaging and phase retrieval in the Fresnel domain [J].
Li, Xianye ;
Meng, Xiangfeng ;
Wang, Yurong ;
Yang, Xiulun ;
Yin, Yongkai ;
Peng, Xiang ;
He, Wenqi ;
Dong, Guoyan ;
Chen, Hongyi .
OPTICS AND LASERS IN ENGINEERING, 2017, 96 :7-16
[10]   Progressive (k, n) secret image sharing Scheme with meaningful shadow images by GEMD and RGEMD [J].
Liu, Yan-Xiao ;
Yang, Ching-Nung ;
Chou, Yung-Shun ;
Wu, Song-Yu ;
Sun, Qin-Dong .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2018, 55 :766-777