A Novel Security Technique Based on Controlled Pixel Based Encryption of Image Blocks for Sharing a Secret Image

被引:3
作者
Rathore, Neeraj Kumar [1 ]
Pandey, Dhiraj [2 ]
Doewes, Rumi Iqbal [3 ]
Bhatt, Abhishek [4 ]
机构
[1] Indira Gandhi Natl Tribal Univ IGNTU, Dept Comp Sci, Amarkantak, MP, India
[2] JSS Acad Tech Educ Noida, Noida, UP, India
[3] Univ Sebelas Maret, JI Ir Sutami 36A, Kentingan Surakarta, Indonesia
[4] Coll Engn, Dept Elect & Telecommun Engn, Pune, Maharashtra, India
关键词
Secret sharing scheme; Visual cryptography; Progressive visual cryptography; Unexpanded shares; Image encryption; INVARIANT VISUAL CRYPTOGRAPHY; JOB MIGRATION; SCHEMES; TRANSFORM; ALGORITHM; QUALITY;
D O I
10.1007/s11277-021-08630-w
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The existing approaches of block based recovery of progressive secret sharing paradigm have support for limited k value in (k, n). Sian et al.'s as well Quan et al.'s block based visual secret sharing scheme has limited bound; works for a limited k value of (k, n) threshold scheme. A novel threshold based (any value of k and n) block recovery in progressive secret sharing has been introduced and analyzed in this paper. Scheme achieves higher value of threshold than the schemes proposed by Sian et al.'s as well Quan et al.'s. The scheme discusses the sharing ability in progressive block based secret sharing up to any general number of thresholds. The contrast of the recovered block wise secret is reasonably good and the scheme allows for perfect security using at least k numbers of participants before revealing any of the blocks of secret image. The work in this paper offering a reference point for developing solutions needed in the area of secure image sharing techniques.
引用
收藏
页码:191 / 207
页数:17
相关论文
共 50 条
  • [31] A Novel Image Encryption Technique Based on Generalized Advanced Encryption Standard Based on Field of Any Characteristic
    Majid Khan
    Noor Munir
    Wireless Personal Communications, 2019, 109 : 849 - 867
  • [32] A NOVEL IMAGE SECRET SHARING SCHEME WITH MEANINGFUL SHARES
    Cai, Hongliang
    Liu, Huajian
    Yuan, Qizhao
    Steinebach, Martin
    Wang, Xiaojing
    2015 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING (ICASSP), 2015, : 1767 - 1771
  • [33] A novel double-image encryption scheme based on cross-image pixel scrambling in gyrator domains
    Chen, Jun-xin
    Zhu, Zhi-liang
    Liu, Zhengjun
    Fu, Chong
    Zhang, Li-bo
    Yu, Hai
    OPTICS EXPRESS, 2014, 22 (06): : 7349 - 7361
  • [34] A geometry-based secret image sharing approach
    Chen, Chien-Chang
    Fu, Wen-Yin
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2008, 24 (05) : 1567 - 1577
  • [35] A novel DNA-based key scrambling technique for image encryption
    Uddin, Machbah
    Jahan, Farah
    Islam, Mohammad Khairul
    Hassan, Md Rakib
    COMPLEX & INTELLIGENT SYSTEMS, 2021, 7 (06) : 3241 - 3258
  • [36] A novel DNA-based key scrambling technique for image encryption
    Machbah Uddin
    Farah Jahan
    Mohammad Khairul Islam
    Md. Rakib Hassan
    Complex & Intelligent Systems, 2021, 7 : 3241 - 3258
  • [37] An Image Secret Sharing Method Based on Matrix Theory
    Ding, Wanmeng
    Liu, Kesheng
    Yan, Xuehu
    Wang, Huaixi
    Liu, Lintao
    Gong, Qinghong
    SYMMETRY-BASEL, 2018, 10 (10):
  • [38] Secured image storage and transmission technique suitable for IoT using Tangle and a novel image encryption technique
    Rajitha, B.
    Makhija, Nishkarsh
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (24) : 36793 - 36814
  • [39] A Novel Image Encryption Technique using RGB pixel displacement for Color Images
    Somaraj, Shrija
    Hussain, Mohammed Ali
    2016 IEEE 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (IACC), 2016, : 275 - 279
  • [40] Exploiting compressed sensing and polynomial-based progressive secret image sharing for visually secure image selection encryption with authentication
    Gan, Zhihua
    Song, Shiping
    Zhou, Lin
    Han, Daojun
    Fu, Jiangyu
    Chai, Xiuli
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (10) : 9252 - 9272