A Novel Image Secret Sharing Scheme without Third-Party Scrambling Method

被引:0
|
作者
Weitong Hu
Ye Yao
Di Zhou
Qiuhua Zheng
Kim-Kwang Raymond Choo
机构
[1] Hangzhou Dianzi University,School of Cyberspace
[2] Zhejiang Uniview Technologies Co.,Department of Information Systems and Cyber Security
[3] Ltd,undefined
[4] The University of Texas at San Antonio,undefined
来源
Mobile Networks and Applications | 2019年 / 24卷
关键词
Image secret sharing; Scrambling method; Cellular automata;
D O I
暂无
中图分类号
学科分类号
摘要
Values such as cellular sum in initial configurations and neighbor radius can potentially affect confusion and diffusion in cellular automata. Specifically, both confusion and diffusion characteristics in cellular automata usually are not sufficient to break up the high correlation between the secret image pixels when these two parameters are too small. Thus, using only One-Dimensional Reversible Memory Cellular Automata (ODRM-CA) to generate shadow images will lead to the leakage of original secret image’s information by some shadow images. In order to solve this problem, in this paper, we propose an image secret sharing (ISS) scheme with no third-party scrambling method. This is realized by increasing the values of cellular sum and neighbor radius to implement the scrambling process for the secret image, thus both processes of image scrambling and image secret sharing can be achieved by ODRM-CA. Experimental results show that this scheme can generate strong random shadow images to avoid leaking information of the original secret image.
引用
收藏
页码:1317 / 1335
页数:18
相关论文
共 36 条
  • [31] Improvements of a two-in-one image secret sharing scheme based on gray mixing model
    Li, Peng
    Ma, Pei-Jun
    Su, Xiao-Hong
    Yang, Ching-Nung
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2012, 23 (03) : 441 - 453
  • [32] Secret image sharing scheme with authentication and remedy abilities based on cellular automata and discrete wavelet transform
    Wu, Xiaotian
    Sun, Wei
    JOURNAL OF SYSTEMS AND SOFTWARE, 2013, 86 (04) : 1068 - 1088
  • [33] Improve Information Rate in Thien and Lin's Image Secret Sharing Scheme Using Huffman Coding Technique
    Markandeya, Nehal
    Patil, Sonali
    2017 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA), 2017,
  • [34] Lossless (k, n)-Threshold Image Secret Sharing Based on the Chinese Remainder Theorem Without Auxiliary Encryption
    Li, Longlong
    Lu, Yuliang
    Yan, Xuehu
    Liu, Lintao
    Tan, Longdan
    IEEE ACCESS, 2019, 7 : 75113 - 75121
  • [35] Image secret sharing method with two-decoding-options: Loss less recovery and previewing capability
    Yang, Ching-Nung
    Ciou, Chuei-Bang
    IMAGE AND VISION COMPUTING, 2010, 28 (12) : 1600 - 1610
  • [36] Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing基于公钥具有双向影子图像验证功能且无像素扩张的图像秘密分享
    Xuehu Yan
    Longlong Li
    Jia Chen
    Lei Sun
    Frontiers of Information Technology & Electronic Engineering, 2023, 24 : 88 - 103