A Novel Security Technique Based on Controlled Pixel Based Encryption of Image Blocks for Sharing a Secret Image

被引:3
作者
Rathore, Neeraj Kumar [1 ]
Pandey, Dhiraj [2 ]
Doewes, Rumi Iqbal [3 ]
Bhatt, Abhishek [4 ]
机构
[1] Indira Gandhi Natl Tribal Univ IGNTU, Dept Comp Sci, Amarkantak, MP, India
[2] JSS Acad Tech Educ Noida, Noida, UP, India
[3] Univ Sebelas Maret, JI Ir Sutami 36A, Kentingan Surakarta, Indonesia
[4] Coll Engn, Dept Elect & Telecommun Engn, Pune, Maharashtra, India
关键词
Secret sharing scheme; Visual cryptography; Progressive visual cryptography; Unexpanded shares; Image encryption; INVARIANT VISUAL CRYPTOGRAPHY; JOB MIGRATION; SCHEMES; TRANSFORM; ALGORITHM; QUALITY;
D O I
10.1007/s11277-021-08630-w
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The existing approaches of block based recovery of progressive secret sharing paradigm have support for limited k value in (k, n). Sian et al.'s as well Quan et al.'s block based visual secret sharing scheme has limited bound; works for a limited k value of (k, n) threshold scheme. A novel threshold based (any value of k and n) block recovery in progressive secret sharing has been introduced and analyzed in this paper. Scheme achieves higher value of threshold than the schemes proposed by Sian et al.'s as well Quan et al.'s. The scheme discusses the sharing ability in progressive block based secret sharing up to any general number of thresholds. The contrast of the recovered block wise secret is reasonably good and the scheme allows for perfect security using at least k numbers of participants before revealing any of the blocks of secret image. The work in this paper offering a reference point for developing solutions needed in the area of secure image sharing techniques.
引用
收藏
页码:191 / 207
页数:17
相关论文
共 50 条
  • [41] Secret image sharing based on cellular automata and steganography
    Eslami, Z.
    Razzaghi, S. H.
    Ahmadabadi, J. Zarepour
    PATTERN RECOGNITION, 2010, 43 (01) : 397 - 404
  • [42] A fast image encryption scheme with a novel pixel swapping-based confusion approach
    Jun-xin Chen
    Zhi-liang Zhu
    Chong Fu
    Hai Yu
    Nonlinear Dynamics, 2014, 77 : 1191 - 1207
  • [43] Implementation of Image Encryption based on Chaos-IWT-An Image security
    Banu, Aashiq S.
    Nilofer, Noorul A.
    Harini, M.
    Dhivya, R.
    Rengarajan, Amirtharajan
    2020 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI - 2020), 2020, : 296 - 299
  • [44] A novel image encryption method based on the cycle replacement
    Wang, Pu
    Liu, Xiaojun
    Xu, Jing
    Lu, Chenhao
    PHYSICA SCRIPTA, 2024, 99 (10)
  • [45] A novel image encryption scheme based on an elliptic curve
    Hayat, Umar
    Azam, Naveed Ahmed
    SIGNAL PROCESSING, 2019, 155 : 391 - 402
  • [47] Fuzzy Logic Based Image Encryption for Confidential Data Transfer Using (2,2) Secret Sharing Scheme
    Mudia, Hinal M.
    Chavan, Pallavi V.
    1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 632 - 639
  • [48] Partial reversible AMBTC-based secret image sharing with steganography
    Wu, Xiaotian
    Yang, Ching-Nung
    DIGITAL SIGNAL PROCESSING, 2019, 93 : 22 - 33
  • [49] Cryptanalysis on an Image Scrambling Encryption Scheme Based on Pixel Bit
    Zhao, Liang
    Adhikari, Avishek
    Xiao, Di
    Sakurai, Kouichi
    DIGITAL WATERMARKING, 2011, 6526 : 45 - +
  • [50] Double-image encryption by using chaos-based local pixel scrambling technique and gyrator transform
    Li, Huijuan
    Wang, Yurong
    Yan, Haitao
    Li, Liben
    Li, Qiuze
    Zhao, Xiaoyan
    OPTICS AND LASERS IN ENGINEERING, 2013, 51 (12) : 1327 - 1331