A Novel Image Secret Sharing Scheme without Third-Party Scrambling Method

被引:0
|
作者
Weitong Hu
Ye Yao
Di Zhou
Qiuhua Zheng
Kim-Kwang Raymond Choo
机构
[1] Hangzhou Dianzi University,School of Cyberspace
[2] Zhejiang Uniview Technologies Co.,Department of Information Systems and Cyber Security
[3] Ltd,undefined
[4] The University of Texas at San Antonio,undefined
来源
关键词
Image secret sharing; Scrambling method; Cellular automata;
D O I
暂无
中图分类号
学科分类号
摘要
Values such as cellular sum in initial configurations and neighbor radius can potentially affect confusion and diffusion in cellular automata. Specifically, both confusion and diffusion characteristics in cellular automata usually are not sufficient to break up the high correlation between the secret image pixels when these two parameters are too small. Thus, using only One-Dimensional Reversible Memory Cellular Automata (ODRM-CA) to generate shadow images will lead to the leakage of original secret image’s information by some shadow images. In order to solve this problem, in this paper, we propose an image secret sharing (ISS) scheme with no third-party scrambling method. This is realized by increasing the values of cellular sum and neighbor radius to implement the scrambling process for the secret image, thus both processes of image scrambling and image secret sharing can be achieved by ODRM-CA. Experimental results show that this scheme can generate strong random shadow images to avoid leaking information of the original secret image.
引用
收藏
页码:1317 / 1335
页数:18
相关论文
共 50 条
  • [1] A Novel Image Secret Sharing Scheme without Third-Party Scrambling Method
    Hu, Weitong
    Yao, Ye
    Zhou, Di
    Zheng, Qiuhua
    Choo, Kim-Kwang Raymond
    MOBILE NETWORKS & APPLICATIONS, 2019, 24 (04): : 1317 - 1335
  • [2] A novel (n, t, n) secret image sharing scheme without a trusted third party
    Guo, Cheng
    Chang, Chin-Chen
    Qin, Chuan
    MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 72 (03) : 2195 - 2209
  • [3] A novel (n, t, n) secret image sharing scheme without a trusted third party
    Cheng Guo
    Chin-Chen Chang
    Chuan Qin
    Multimedia Tools and Applications, 2014, 72 : 2195 - 2209
  • [4] A Novel Visual Secret Sharing Scheme without Image Size Expansion
    Askari, Nazanin
    Moloney, Cecilia
    Heys, H. M.
    2012 25TH IEEE CANADIAN CONFERENCE ON ELECTRICAL & COMPUTER ENGINEERING (CCECE), 2012,
  • [5] A (n, n) Secret Image Sharing Scheme Based On Array Scrambling
    Bhattacharjee, Tapasi
    Singh, Jyoti Prakash
    Bhattacharya, Samar
    2012 THIRD INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT), 2012, : 287 - 290
  • [6] A Novel (2,n) Secret Image Sharing Scheme
    Bhattacharjee, Tapasi
    Singh, Jyoti Prakash
    Nag, Amitava
    2ND INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION, CONTROL AND INFORMATION TECHNOLOGY (C3IT-2012), 2012, 4 : 619 - 623
  • [7] Novel quantum secret image-sharing scheme
    罗高峰
    周日贵
    胡文文
    Chinese Physics B, 2019, 28 (04) : 65 - 73
  • [8] A novel weighted threshold secret image sharing scheme
    Li, Mingchu
    Ma, Shu
    Guo, Cheng
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3083 - 3093
  • [9] Novel quantum secret image-sharing scheme
    Luo, Gao-Feng
    Zhou, Ri-Gui
    Hu, Wen-Wen
    CHINESE PHYSICS B, 2019, 28 (04)
  • [10] A NOVEL IMAGE SECRET SHARING SCHEME WITH MEANINGFUL SHARES
    Cai, Hongliang
    Liu, Huajian
    Yuan, Qizhao
    Steinebach, Martin
    Wang, Xiaojing
    2015 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING (ICASSP), 2015, : 1767 - 1771