Combination of Sharing Matrix and Image Encryption for Lossless (k, n)-Secret Image Sharing

被引:58
作者
Bao, Long [1 ]
Yi, Shuang [1 ]
Zhou, Yicong [1 ]
机构
[1] Univ Macau, Dept Comp & Informat Sci, Macau 999078, Peoples R China
关键词
Secret image sharing; visual cryptography; sharing matrix; image encryption; VISUAL CRYPTOGRAPHY; CHAOTIC SYSTEM; SCHEME; CRYPTANALYSIS;
D O I
10.1109/TIP.2017.2738561
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper first introduces a (k, n)-sharing matrix S-(k,S- n) and its generation algorithm. Mathematical analysis is provided to show its potential for secret image sharing. Combining sharing matrix with image encryption, we further propose a lossless (k, n)-secret image sharing scheme (SMIE-SIS). Only with no less than k shares, all the ciphertext information and security key can be reconstructed, which results in a lossless recovery of original information. This can be proved by the correctness and security analysis. Performance evaluation and security analysis demonstrate that the proposed SMIE-SIS with arbitrary settings of k and n has at least five advantages: 1) it is able to fully recover the original image without any distortion; 2) it has much lower pixel expansion than many existing methods; 3) its computation cost is much lower than the polynomial-based secret image sharing methods; 4) it is able to verify and detect a fake share; and 5) even using the same original image with the same initial settings of parameters, every execution of SMIE-SIS is able to generate completely different secret shares that are unpredictable and non-repetitive. This property offers SMIE-SIS a high level of security to withstand many different attacks.
引用
收藏
页码:5618 / 5631
页数:14
相关论文
共 50 条
  • [21] Efficient and Lossless Polynomial-Based Secret Image Sharing for Color Images
    Gong, Qinghong
    Wang, Yongjie
    Yan, Xuehu
    Liu, Lintao
    IEEE ACCESS, 2019, 7 : 113216 - 113222
  • [22] (k, n) scalable secret image sharing with multiple decoding options
    Liu, Yan-Xiao
    Yang, Ching-Nung
    Sun, Qin-Dong
    Chen, Yi-Cheng
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 38 (01) : 219 - 228
  • [23] Improved Beta Chaotic Image Encryption for Multiple Secret Sharing
    Guo, Jing-Ming
    Riyono, Dwi
    Prasetyo, Heri
    IEEE ACCESS, 2018, 6 : 46297 - 46321
  • [24] Secret Image Sharing Using (t,n) Threshold Scheme with Lossless Recovery
    Chien, Ming-Chun
    Hwang, Jen-Ing G.
    2012 5TH INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING (CISP), 2012, : 1325 - 1329
  • [25] (k, n) secret image sharing scheme with privileged set
    Yang, Ching-Nung
    Li, Peng
    Kuo, Hsin-Chuan
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 73
  • [26] Weighted Secret Image Sharing for a (k, n) Threshold Based on the Chinese Remainder Theorem
    Tan, Longdan
    Lu, Yuliang
    Yan, Xuehu
    Liu, Lintao
    Li, Longlong
    IEEE ACCESS, 2019, 7 : 59278 - 59286
  • [27] Security Analysis of Secret Image Sharing
    Yan, Xuehu
    Lu, Yuliang
    Liu, Lintao
    Wan, Song
    Ding, Wanmeng
    Liu, Hanlin
    DATA SCIENCE, PT 1, 2017, 727 : 305 - 316
  • [28] Secret Sharing-Based Chaotic Image Encryption
    Zhang, Tiejun
    El-Fatyany, Aya
    Li, Li
    Amin, Mohamed
    Abd El-Latif, Ahmed A.
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (07): : 217 - 224
  • [29] Multiparty verification in image secret sharing
    Yan, Xuehu
    Li, Junhao
    Pan, Zulie
    Zhong, Xiaofeng
    Yang, Guozheng
    INFORMATION SCIENCES, 2021, 562 : 475 - 490
  • [30] Applying Secret Image Sharing to Economics
    Zhao, Xuemei
    Zhang, Tongtong
    Liu, Jun
    Lu, Canju
    Lu, Huan
    Yan, Xuehu
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2021, 13 (04) : 16 - 25