Distortion less secret image sharing scheme for Internet of Things system

被引:27
作者
Li, Li [1 ]
Hossain, M. Shamim [2 ,3 ]
Abd El-Latif, Ahmed A. [4 ]
Alhamid, M. F. [2 ]
机构
[1] Shenzhen Inst Informat Technol, Shenzhen 518172, Peoples R China
[2] King Saud Univ, Dept Software Engn, Coll Comp & Informat Sci, Riyadh 11543, Saudi Arabia
[3] King Saud Univ, Coll Comp & Informat Sci, Chair Pervas & Mobile Comp, Riyadh, Saudi Arabia
[4] Menoufia Univ, Fac Sci, Dept Math, Shibin Al Kawm 32511, Egypt
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2019年 / 22卷 / Suppl 1期
关键词
Secret image sharing; Internet of things; Lossless recovery; Image steganography; 2(4)-ary notational system; SECURE; CLOUD; STEGANOGRAPHY; STORAGE;
D O I
10.1007/s10586-017-1345-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secret image sharing is the study of sharing a secret image with several participants to prevent the malicious participant obtaining information about the secret image. Traditional methods generate meaningless shares, which are unintelligible and easily lead to suspicions of secret image encryption. Rather, sharing methods with steganography were studied. In this paper, a novel secret sharing scheme for image is proposed based on Shamir's polynomials with steganography the Internet of Things (IoT) system, where IoT devices could share images seamlessly between them over cloud. In this proposed method, secret shares are generated from the cover image and secret information, and the shares of IoT services are embedded back to the cover image based on on-ary notational system, which creates stego-shadow images. Experimental results and analysis show that the proposed scheme can recover both the secret information and cover image lossless. Besides, it achieves high embedding capacity, obtains stego-shadow images of high quality and resists the histogram analysis.
引用
收藏
页码:2293 / 2307
页数:15
相关论文
共 45 条
[1]   Federated Internet of Things and Cloud Computing Pervasive Patient Health Monitoring System [J].
Abawajy, Jemal H. ;
Hassan, Mohammad Mehedi .
IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (01) :48-53
[2]   New secure healthcare system using cloud of things [J].
Al Alkeem, Ebrahim ;
Shehada, Dina ;
Yeun, Chan Yeob ;
Zemerly, M. Jamal ;
Hu, Jiankun .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (03) :2211-2229
[3]  
[Anonymous], 2012, RES J APPL SCI ENG T
[4]   Secret Sharing and Multi-user Authentication: From Visual Cryptography to RRAM Circuits [J].
Arafin, Md Tanvir ;
Qu, Gang .
2016 INTERNATIONAL GREAT LAKES SYMPOSIUM ON VLSI (GLSVLSI), 2016, :169-174
[5]  
Blakley G. R., 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK), P313, DOI 10.1109/MARK.1979.8817296
[6]   Visual cryptography for grey level images [J].
Blundo, C ;
De Santis, A ;
Naor, M .
INFORMATION PROCESSING LETTERS, 2000, 75 (06) :255-259
[7]   Towards secure and flexible EHR sharing in mobile health cloud under static assumptions [J].
Cai, Zhaoquan ;
Yan, Hongyang ;
Li, Ping ;
Huang, Zheng-an ;
Gao, Chongzhi .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (03) :2415-2422
[8]   Sharing secrets in stego images with authentication [J].
Chang, Chin-Chen ;
Hsieh, Yi-Pei ;
Lin, Chia-Hsuan .
PATTERN RECOGNITION, 2008, 41 (10) :3130-3137
[9]  
Cheng Guo, 2011, Journal of Multimedia, V6, P341, DOI 10.4304/jmm.6.4.341-348
[10]   A sudoku-based secret image sharing scheme with reversibility [J].
Chang C.-C. ;
Lin P.-Y. ;
Wang Z.H. ;
Li M.C. .
Journal of Communications, 2010, 5 (01) :5-12