Combination of Sharing Matrix and Image Encryption for Lossless (k, n)-Secret Image Sharing

被引:60
作者
Bao, Long [1 ]
Yi, Shuang [1 ]
Zhou, Yicong [1 ]
机构
[1] Univ Macau, Dept Comp & Informat Sci, Macau 999078, Peoples R China
关键词
Secret image sharing; visual cryptography; sharing matrix; image encryption; VISUAL CRYPTOGRAPHY; CHAOTIC SYSTEM; SCHEME; CRYPTANALYSIS;
D O I
10.1109/TIP.2017.2738561
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper first introduces a (k, n)-sharing matrix S-(k,S- n) and its generation algorithm. Mathematical analysis is provided to show its potential for secret image sharing. Combining sharing matrix with image encryption, we further propose a lossless (k, n)-secret image sharing scheme (SMIE-SIS). Only with no less than k shares, all the ciphertext information and security key can be reconstructed, which results in a lossless recovery of original information. This can be proved by the correctness and security analysis. Performance evaluation and security analysis demonstrate that the proposed SMIE-SIS with arbitrary settings of k and n has at least five advantages: 1) it is able to fully recover the original image without any distortion; 2) it has much lower pixel expansion than many existing methods; 3) its computation cost is much lower than the polynomial-based secret image sharing methods; 4) it is able to verify and detect a fake share; and 5) even using the same original image with the same initial settings of parameters, every execution of SMIE-SIS is able to generate completely different secret shares that are unpredictable and non-repetitive. This property offers SMIE-SIS a high level of security to withstand many different attacks.
引用
收藏
页码:5618 / 5631
页数:14
相关论文
共 48 条
[1]   Cryptanalysis of "an improvement over an image encryption method based on total shuffling" [J].
Akhavan, A. ;
Samsudin, A. ;
Akhshani, A. .
OPTICS COMMUNICATIONS, 2015, 350 :77-82
[2]   Some basic cryptographic requirements for chaos-based cryptosystems [J].
Alvarez, Gonzalo ;
Li, Shujun .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2006, 16 (08) :2129-2151
[3]   Discrete Lyapunov exponent and resistance to differential cryptanalysis [J].
Amigo, Jose Maria ;
Kocarev, Ljupco ;
Szczepanski, Janusz .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2007, 54 (10) :882-886
[4]  
ARROYO D, 2008, INADEQUACY LOGISTIC
[5]   Image encryption: Generating visually meaningful encrypted images [J].
Bao, Long ;
Zhou, Yicong .
INFORMATION SCIENCES, 2015, 324 :197-207
[6]   SECRET IMAGE SHARING: A BOOLEAN-OPERATIONS-BASED APPROACH COMBINING BENEFITS OF POLYNOMIAL-BASED AND FAST APPROACHES [J].
Chao, Kun-Yuan ;
Lin, Ja-Chen .
INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2009, 23 (02) :263-285
[7]  
Chen CC, 2007, 2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL 1, PROCEEDINGS, P515
[8]   Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage [J].
Chu, Cheng-Kang ;
Chow, Sherman S. M. ;
Tzeng, Wen-Guey ;
Zhou, Jianying ;
Deng, Robert H. .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (02) :468-477
[9]   On the Relation of Random Grid and Deterministic Visual Cryptography [J].
De Prisco, Roberto ;
De Santis, Alfredo .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (04) :653-665
[10]   A chaos-based digital image encryption scheme with an improved diffusion strategy [J].
Fu, Chong ;
Chen, Jun-jie ;
Zou, Hao ;
Meng, Wei-hong ;
Zhan, Yong-feng ;
Yu, Ya-wen .
OPTICS EXPRESS, 2012, 20 (03) :2363-2378