A Novel Image Secret Sharing Scheme without Third-Party Scrambling Method

被引:0
|
作者
Weitong Hu
Ye Yao
Di Zhou
Qiuhua Zheng
Kim-Kwang Raymond Choo
机构
[1] Hangzhou Dianzi University,School of Cyberspace
[2] Zhejiang Uniview Technologies Co.,Department of Information Systems and Cyber Security
[3] Ltd,undefined
[4] The University of Texas at San Antonio,undefined
来源
关键词
Image secret sharing; Scrambling method; Cellular automata;
D O I
暂无
中图分类号
学科分类号
摘要
Values such as cellular sum in initial configurations and neighbor radius can potentially affect confusion and diffusion in cellular automata. Specifically, both confusion and diffusion characteristics in cellular automata usually are not sufficient to break up the high correlation between the secret image pixels when these two parameters are too small. Thus, using only One-Dimensional Reversible Memory Cellular Automata (ODRM-CA) to generate shadow images will lead to the leakage of original secret image’s information by some shadow images. In order to solve this problem, in this paper, we propose an image secret sharing (ISS) scheme with no third-party scrambling method. This is realized by increasing the values of cellular sum and neighbor radius to implement the scrambling process for the secret image, thus both processes of image scrambling and image secret sharing can be achieved by ODRM-CA. Experimental results show that this scheme can generate strong random shadow images to avoid leaking information of the original secret image.
引用
收藏
页码:1317 / 1335
页数:18
相关论文
共 50 条
  • [21] A novel image secret sharing scheme based on pixel field
    Zhang, Jing-zhong
    Chen, Liang
    Teng, Peng-guo
    EIGHTH INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2016), 2016, 10033
  • [22] A Novel Secret Image Sharing Scheme based on Chaotic System
    Li, Li
    Abd El-Latif, Ahmed A.
    Wang, Chuanjun
    Li, Qiong
    Niu, Xiamu
    FOURTH INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2012), 2012, 8334
  • [23] A novel secret image sharing scheme using large primes
    Ghebleh, Mohammad
    Kanso, Ali
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (10) : 11903 - 11923
  • [24] A novel proactive secret image sharing scheme based on LISS
    Cheng Guo
    Huan Zhang
    Zhangjie Fu
    Bin Feng
    Mingchu Li
    Multimedia Tools and Applications, 2018, 77 : 19569 - 19590
  • [25] An image secret sharing scheme with the capability of previvewing the secret image
    Yang, Ching-Nung
    Chen, Tse-Shih
    2007 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-5, 2007, : 1535 - 1538
  • [26] A Compact Secret Image Sharing Scheme Based on Flexible Secret Matrix Sharing Scheme
    Wang, Lingfu
    Wang, Jing
    Zhang, Mingwu
    Huang, Weijia
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2021, PT III, 2022, 13157 : 411 - 431
  • [27] Sharing a quantum secret without a trusted party
    Qin Li
    Dong Yang Long
    W. H. Chan
    Dao Wen Qiu
    Quantum Information Processing, 2011, 10 : 97 - 106
  • [28] Data popularity-based encrypted deduplication scheme without third-party servers
    Ha, Guanxiong
    Jia, Qiaowen
    Chen, Hang
    Jia, Chunfu
    Tongxin Xuebao/Journal on Communications, 2022, 43 (08): : 17 - 29
  • [29] Sharing a quantum secret without a trusted party
    Li, Qin
    Long, Dong Yang
    Chan, W. H.
    Qiu, Dao Wen
    QUANTUM INFORMATION PROCESSING, 2011, 10 (01) : 97 - 106
  • [30] AN IMPROVED SCHEME FOR SECRET IMAGE SHARING
    Alharthi, Saeed
    Atrey, Pradeep K.
    2010 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME 2010), 2010, : 1661 - 1666