A novel multi secret image sharing scheme for different dimension secrets

被引:0
|
作者
Arjun Singh Rawat
Maroti Deshmukh
Maheep Singh
机构
[1] National Institute of Technology,
来源
关键词
Secret images; Shares; Reconstructed secrets; Same dimension secrets; Different dimension secrets; Attacked share;
D O I
暂无
中图分类号
学科分类号
摘要
The existing state of the art schemes deals with the same dimension secret images but less work is available in the literature for different dimension secret images. In this paper, we have proposed an efficient multi secret image sharing scheme for different dimension secret images. In the proposed scheme, Chinese Remainder Theorem (CRT), shift and XOR operations are used for shares generation and secrets reconstruction to provide more randomized shares without revealing any secret information. The proposed scheme is attack resistive as if there is an attack on any of the share(s) then the reconstructed secrets doesn’t reveal the attacked portion whereas the remaining portion of the secrets gets reconstructed correctly. This confirms that an attack has been performed on the share(s) during transmission. The quantitative analysis of the proposed scheme is performed using Jaccard coefficient, correlation, RMSE, PSNR, MAE, NPCR, UACI, Information Entropy, and EQ parameters whereas the qualitative analysis has been performed using histogram analysis. The experimental results shows that the proposed scheme performs better on different dimension secret images.
引用
收藏
页码:35183 / 35219
页数:36
相关论文
共 50 条
  • [41] Highly efficient and secure multi-secret image sharing scheme
    Chien-Chang Chen
    Wei-Jie Wu
    Jun-Long Chen
    Multimedia Tools and Applications, 2016, 75 : 7113 - 7128
  • [42] A new multi-secret image sharing scheme based on DCT
    Oinam Bidyapati Chanu
    Arambam Neelima
    The Visual Computer, 2020, 36 : 939 - 950
  • [43] Enhanced Boolean-based multi secret image sharing scheme
    Yang, Ching-Nung
    Chen, Cheng-Hua
    Cai, Song-Ruei
    JOURNAL OF SYSTEMS AND SOFTWARE, 2016, 116 : 22 - 34
  • [44] Security of audio secret sharing scheme encrypting audio secrets
    Yoshida, Kotaro
    Watanabe, Yodai
    2012 INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS, 2012, : 294 - 295
  • [45] A Novel Visual Secret Sharing Scheme without Image Size Expansion
    Askari, Nazanin
    Moloney, Cecilia
    Heys, H. M.
    2012 25TH IEEE CANADIAN CONFERENCE ON ELECTRICAL & COMPUTER ENGINEERING (CCECE), 2012,
  • [46] A Novel(n,n)Secret Image Sharing Scheme Based on Sudoku
    Zhi-Hui Wang
    Cheng Guo
    Chin-Chen Chang
    Journal of Electronic Science and Technology, 2013, 11 (01) : 44 - 50
  • [47] A Novel Approach of an (n, n) Multi-Secret Image Sharing Scheme Using Additive Modulo
    Deshmukh, Maroti
    Nain, Neeta
    Ahmed, Mushtaq
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMPUTER VISION AND IMAGE PROCESSING, CVIP 2016, VOL 1, 2017, 459 : 149 - 158
  • [48] A novel perceptual secret sharing scheme
    Yan, Xuehu
    Wang, Shen
    El-Latif, Ahmed A. Abd
    Sang, Jianzhi
    Niu, Xiamu
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8363 : 68 - 90
  • [49] Novel and effective secret sharing scheme
    Shi, Run-Hua
    Huang, Liu-Sheng
    Yang, Wei
    Zhong, Hong
    Tongxin Xuebao/Journal on Communications, 2012, 33 (01): : 10 - 16
  • [50] A Novel Multi Secret Sharing Scheme with MSB Extraction Using EVCS
    Aarti
    Rajput, Pushpendra K.
    2013 SIXTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2013, : 169 - 174