A Novel Image Secret Sharing Scheme without Third-Party Scrambling Method

被引:0
|
作者
Weitong Hu
Ye Yao
Di Zhou
Qiuhua Zheng
Kim-Kwang Raymond Choo
机构
[1] Hangzhou Dianzi University,School of Cyberspace
[2] Zhejiang Uniview Technologies Co.,Department of Information Systems and Cyber Security
[3] Ltd,undefined
[4] The University of Texas at San Antonio,undefined
来源
关键词
Image secret sharing; Scrambling method; Cellular automata;
D O I
暂无
中图分类号
学科分类号
摘要
Values such as cellular sum in initial configurations and neighbor radius can potentially affect confusion and diffusion in cellular automata. Specifically, both confusion and diffusion characteristics in cellular automata usually are not sufficient to break up the high correlation between the secret image pixels when these two parameters are too small. Thus, using only One-Dimensional Reversible Memory Cellular Automata (ODRM-CA) to generate shadow images will lead to the leakage of original secret image’s information by some shadow images. In order to solve this problem, in this paper, we propose an image secret sharing (ISS) scheme with no third-party scrambling method. This is realized by increasing the values of cellular sum and neighbor radius to implement the scrambling process for the secret image, thus both processes of image scrambling and image secret sharing can be achieved by ODRM-CA. Experimental results show that this scheme can generate strong random shadow images to avoid leaking information of the original secret image.
引用
收藏
页码:1317 / 1335
页数:18
相关论文
共 50 条
  • [41] A novel approach for multilevel multi-secret image sharing scheme
    Kanchan Bisht
    Maroti Deshmukh
    The Journal of Supercomputing, 2021, 77 : 12157 - 12191
  • [42] An image secret sharing method
    Bai, Li
    Biswas, Saroj
    Ortiz, Albert
    Dalessandro, Don
    2006 9TH INTERNATIONAL CONFERENCE ON INFORMATION FUSION, VOLS 1-4, 2006, : 1722 - 1727
  • [43] Third-Party Customization of Residential Internet Sharing using SDN
    Gharakheili, Hassan Habibi
    Exton, Luke
    Sivaraman, Vijay
    Matthews, John
    Russell, Craig
    25TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC 2015), 2015, : 214 - 219
  • [44] A Privacy-Preserving Ride-Matching Scheme Without a Trusted Third-Party Server
    Shen, Xiaoying
    Wang, Zhen
    Wang, Baocang
    Wang, Licheng
    Pei, Qingqi
    IEEE SYSTEMS JOURNAL, 2023, 17 (04): : 6413 - 6424
  • [45] A novel perceptual secret sharing scheme
    Yan, Xuehu
    Wang, Shen
    El-Latif, Ahmed A. Abd
    Sang, Jianzhi
    Niu, Xiamu
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8363 : 68 - 90
  • [46] Novel and effective secret sharing scheme
    Shi, Run-Hua
    Huang, Liu-Sheng
    Yang, Wei
    Zhong, Hong
    Tongxin Xuebao/Journal on Communications, 2012, 33 (01): : 10 - 16
  • [47] A quick method of assessing third-party plans
    Brownlow, Charles B.
    OPTOMETRY-JOURNAL OF THE AMERICAN OPTOMETRIC ASSOCIATION, 2009, 80 (06) : 331 - 332
  • [48] Improved multiple secret sharing using generalized chaotic image scrambling
    Prasetyo, Heri
    Hsia, Chih-Hsien
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (20) : 29089 - 29120
  • [49] A novel identity authentication technique without trustworthy third-party based on fingerprint verification
    Li, Liang
    Tian, Jie
    Yang, Xin
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3917 : 175 - 176
  • [50] A Novel Progressive Secret Image Sharing Method with Better Robustness
    Liu, Lintao
    Lu, Yuliang
    Yan, Xuehu
    Ding, Wanmeng
    DATA SCIENCE, PT II, 2017, 728 : 539 - 550