Secret image sharing scheme with authentication and remedy abilities based on cellular automata and discrete wavelet transform

被引:16
|
作者
Wu, Xiaotian [1 ]
Sun, Wei [2 ]
机构
[1] Sun Yat Sen Univ, Sch Informat Sci & Technol, Guangzhou 510006, Guangdong, Peoples R China
[2] Sun Yat Sen Univ, Sch Software, Guangzhou 510006, Guangdong, Peoples R China
关键词
Secret image sharing; Authentication; Remedy; Cellular automata; Discrete wavelet transform; STEGANOGRAPHY;
D O I
10.1016/j.jss.2012.11.021
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
A meaningful secret image sharing scheme with authentication and remedy abilities is proposed in this paper. One dimensional cellular automata, discrete wavelet transform and hash function are adopted in the proposed scheme. The stego images are allowed to be verified to determine whether they are tampered or not. Once the stego images are tampered, shared bits retrieved from these tampered areas cannot be used to reconstruct the secret image. Instead, those damaged areas in the secret image can be repaired by the hidden information. Experimental results exhibit that low computation cost, high tamper detection rate and advanced remedy ability against tampering and cropping attacks are achieved by the proposed scheme. (C) 2013 Published by Elsevier Inc.
引用
收藏
页码:1068 / 1088
页数:21
相关论文
共 50 条
  • [21] A (2, n)-SECRET SHARING SCHEME BASED ON LINEAR CELLULAR AUTOMATA
    Martin Del Rey, A.
    Queiruga Dios, A.
    Rodriguez Sanchez, G.
    INTERNATIONAL JOURNAL OF MODERN PHYSICS C, 2008, 19 (10): : 1529 - 1535
  • [22] Discrete Wavelet Transform based Watermarking for Image Content Authentication
    Ur-Rehman, Obaid
    Zivic, Natasa
    ICPRAM: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION APPLICATIONS AND METHODS, 2017, : 620 - 625
  • [23] Audio feature extraction scheme based on secret sharing and wavelet transform
    Hsieh, Shang-Lin
    Chang, Teng-Kuei
    Huang, Bin-Yuan
    Tsai, I-Ju
    INT CONF ON CYBERNETICS AND INFORMATION TECHNOLOGIES, SYSTEMS AND APPLICATIONS/INT CONF ON COMPUTING, COMMUNICATIONS AND CONTROL TECHNOLOGIES, VOL 1, 2007, : 7 - 12
  • [24] A Reversible Steganography Scheme of Secret Image Sharing Based on Cellular Automata and Least Significant Bits Construction
    Hu, Wei-Tong
    Li, Ming-Chu
    Guo, Cheng
    Yuan, Li-Feng
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2015, 2015
  • [25] Integer wavelet transform-based secret image sharing using rook polynomial and hamming code with authentication
    Charoghchi, Sara
    Saeidi, Zahra
    Mashhadi, Samaneh
    CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY, 2024, 9 (06) : 1435 - 1450
  • [26] Secret image sharing scheme with adaptive authentication strength
    Ulutas, Guzin
    Ulutas, Mustafa
    Nabiyev, Vasif V.
    PATTERN RECOGNITION LETTERS, 2013, 34 (03) : 283 - 291
  • [27] A Secret Sharing Scheme for Digital Images Based on Cellular Automata and Boolean Functions
    Martin del Rey, Angel
    Rodriguez Sanchez, Gerardo
    BIO-INSPIRED SYSTEMS: COMPUTATIONAL AND AMBIENT INTELLIGENCE, PT 1, 2009, 5517 : 1200 - +
  • [28] Transform Domain-Based Invertible and Lossless Secret Image Sharing With Authentication
    Xiong, Lizhi
    Zhong, Xinwei
    Yang, Ching-Nung
    Han, Xiao
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 2912 - 2925
  • [29] Integer wavelet transform based watermarking scheme for medical image authentication
    Dey, Ashis
    Chowdhuri, Partha
    Pal, Pabitra
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (32) : 78001 - 78022
  • [30] Image sharing scheme based on discrete fractional random transform
    Liu, Zhengjun
    Liu, Shutian
    Ahmad, Muhammad Ashfaq
    OPTIK, 2010, 121 (06): : 495 - 499