A Novel Image Secret Sharing Scheme without Third-Party Scrambling Method

被引:0
|
作者
Weitong Hu
Ye Yao
Di Zhou
Qiuhua Zheng
Kim-Kwang Raymond Choo
机构
[1] Hangzhou Dianzi University,School of Cyberspace
[2] Zhejiang Uniview Technologies Co.,Department of Information Systems and Cyber Security
[3] Ltd,undefined
[4] The University of Texas at San Antonio,undefined
来源
Mobile Networks and Applications | 2019年 / 24卷
关键词
Image secret sharing; Scrambling method; Cellular automata;
D O I
暂无
中图分类号
学科分类号
摘要
Values such as cellular sum in initial configurations and neighbor radius can potentially affect confusion and diffusion in cellular automata. Specifically, both confusion and diffusion characteristics in cellular automata usually are not sufficient to break up the high correlation between the secret image pixels when these two parameters are too small. Thus, using only One-Dimensional Reversible Memory Cellular Automata (ODRM-CA) to generate shadow images will lead to the leakage of original secret image’s information by some shadow images. In order to solve this problem, in this paper, we propose an image secret sharing (ISS) scheme with no third-party scrambling method. This is realized by increasing the values of cellular sum and neighbor radius to implement the scrambling process for the secret image, thus both processes of image scrambling and image secret sharing can be achieved by ODRM-CA. Experimental results show that this scheme can generate strong random shadow images to avoid leaking information of the original secret image.
引用
收藏
页码:1317 / 1335
页数:18
相关论文
共 37 条
  • [21] A lossless secret image sharing scheme using a larger finite field
    Hu, Weitong
    Wu, Ting
    Chen, Yuanfang
    Shen, Yanzhao
    Yuan, Lifeng
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (19) : 28731 - 28743
  • [22] Two-in-One Image Secret Sharing Scheme Based on Boolean Operations
    Li, Peng
    Yang, Ching-Nung
    Kong, Qian
    DIGITAL-FORENSICS AND WATERMARKING, IWDW 2014, 2015, 9023 : 305 - 318
  • [24] A proactive secret image sharing scheme with resistance to machine learning based steganalysis
    Espejel-Trujillo, Angelina
    Iwamoto, Mitsugu
    Nakano-Miyatake, Mariko
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (12) : 15161 - 15179
  • [25] Multi Secret Image Sharing Scheme of General Access Structure with Meaningful Shares
    Cai, Hongliang
    Tang, Dan
    MATHEMATICS, 2020, 8 (09)
  • [26] A new Boolean-based multiple secret image sharing scheme to share different sized secret images
    Chen, Chien-Chang
    Chen, Jun-Long
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 33 : 45 - 54
  • [27] Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing
    Yan, Xuehu
    Li, Longlong
    Chen, Jia
    Sun, Lei
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2023, 24 (01) : 88 - 103
  • [28] A Cellular Automata Based Verifiable Multi-secret Sharing Scheme Without a Trusted Dealer
    Li Meng
    Yu Jia
    Hao Rong
    CHINESE JOURNAL OF ELECTRONICS, 2017, 26 (02) : 313 - 318
  • [29] A Cellular Automata Based Verifiable Multi-secret Sharing Scheme Without a Trusted Dealer
    LI Meng
    YU Jia
    HAO Rong
    Chinese Journal of Electronics, 2017, 26 (02) : 313 - 318
  • [30] A user-friendly secret image sharing scheme with reversible steganography based on cellular automata
    Wu, Xiaotian
    Ou, Duanhao
    Liang, Qiming
    Sun, Wei
    JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (08) : 1852 - 1863