Improved Beta Chaotic Image Encryption for Multiple Secret Sharing

被引:28
作者
Guo, Jing-Ming [1 ]
Riyono, Dwi [1 ]
Prasetyo, Heri [2 ]
机构
[1] Natl Taiwan Univ Sci & Technol, Dept Elect Engn, Taipei 10607, Taiwan
[2] Univ Sebelas Maret, Dept Informat, Surakarta 57126, Indonesia
关键词
Beta chaotic; Chinese remainder theorem; eXclusive-OR; image encryption; secret sharing; CHINESE REMAINDER THEOREM; SCHEME; ALGORITHM; SYSTEM; MAP; SECURITY;
D O I
10.1109/ACCESS.2018.2863021
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a new simple image encryption technique using the Beta chaotic map for performing the confusion and diffusion of input plain image. This image encryption is further applied to the multiple secret sharing (MSS). The former existing scheme in MSS employs the Chinese remainder theorem (CRT) and eXclusive-oR (XOR) operations to convert the secret image to become a set of shared images. The former scheme yields a good result while the number of secret images is even. However, it has slight limitation while the number of secret images is odd. This paper aims to overcome this problem by utilizing the proposed image encryption along with three new MSS approaches: 1) incorporating an additional random images; 2) performing k image encryption; and 3) using two different masking coefficients. As documented in the experimental section, the proposed method performs well in the MSS task. It solves the problem in former scheme on dealing with odd number of secret images. In addition, the proposed method is superior compared with the other competing schemes. The proposed image encryption also improves the security level in the MSS system.
引用
收藏
页码:46297 / 46321
页数:25
相关论文
共 28 条
[1]   A secure Boolean-based multi-secret image sharing scheme [J].
Chen, Chien-Chang ;
Wu, Wei-Jie .
JOURNAL OF SYSTEMS AND SOFTWARE, 2014, 92 :107-114
[2]   Efficient multi-secret image sharing based on Boolean operations [J].
Chen, Tzung-Her ;
Wu, Chang-Sian .
SIGNAL PROCESSING, 2011, 91 (01) :90-97
[3]   A novel approach for sharing multiple color images by employing Chinese Remainder Theorem [J].
Deshmukh, Maroti ;
Nain, Neeta ;
Ahmed, Mushtaq .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2017, 49 :291-302
[4]   A new multi-secret images sharing scheme using Largrange's interpolation [J].
Feng, JB ;
Wu, HC ;
Tsai, CS ;
Chu, YP .
JOURNAL OF SYSTEMS AND SOFTWARE, 2005, 76 (03) :327-339
[5]   A multi-threshold secret image sharing scheme based on MSP [J].
Guo, Cheng ;
Chang, Chin-Chen ;
Qin, Chuan .
PATTERN RECOGNITION LETTERS, 2012, 33 (12) :1594-1600
[6]   False-positive-free SVD-based image watermarking [J].
Guo, Jing-Ming ;
Prasetyo, Heri .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2014, 25 (05) :1149-1163
[7]  
Harjito B, 2016, 2016 INTERNATIONAL SYMPOSIUM ON ELECTRONICS AND SMART DEVICES (ISESD), P143, DOI 10.1109/ISESD.2016.7886708
[8]   Image encryption using 2D Logistic-adjusted-Sine map [J].
Hua, Zhongyun ;
Zhou, Yicong .
INFORMATION SCIENCES, 2016, 339 :237-253
[9]   2D Sine Logistic modulation map for image encryption [J].
Hua, Zhongyun ;
Zhou, Yicong ;
Pun, Chi-Man ;
Chen, C. L. Philip .
INFORMATION SCIENCES, 2015, 297 :80-94
[10]   Efficient image encryption method based on improved Lorenz chaotic system [J].
Kaur, M. ;
Kumar, V. .
ELECTRONICS LETTERS, 2018, 54 (09) :562-563