Skip to main content

A Secret Sharing Scheme for Digital Images Based on Cellular Automata and Boolean Functions

  • Conference paper
Bio-Inspired Systems: Computational and Ambient Intelligence (IWANN 2009)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 5517))

Included in the following conference series:

Abstract

In this paper an efficient probabilistic secret sharing scheme for black and white digital images is introduced. It is an extension of the algorithm proposed originally in [11]. Specifically, it is a (m, n)-threshold scheme. It is based on the use of a simple matrix boolean function which involves the Hadamard matrix product modulo 2, and the addition modulo 2 and m. Moreover, an algorithm based on cellular automata is used for the enhancement of the recovered image. The algorithm introduced is shown to be secure and its expansion factor is equal to 1.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Álvarez, G., Hernández, L., Martin, A.: A multisecret sharing scheme for color images based on cellular automata. Inform. Sci. 178(22), 4382–4395 (2008)

    Article  MATH  Google Scholar 

  2. Blakley, G.R.: Safeguarding cryptographic keys. In: AFIPS Conf. Proc., vol. 48, pp. 313–317 (1979)

    Google Scholar 

  3. Chang, C., Hwang, R.: Sharing secret images using shadow codebooks. Inform. Sciences 111, 335–345 (1998)

    Article  Google Scholar 

  4. Chen, Y., Chan, Y., Huang, C., Tsai, M., Chu, Y.: A multiple-level visual secret-sharing scheme without image size expansion. Inform. Sciences 177, 4696–4710 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  5. Cimato, S., De Prisco, R., De Santis, A.: Probabilistic visual cryptography schemes. Comput. L. 49(1), 97–107 (2006)

    Google Scholar 

  6. Cimato, S., De Prisco, R., De Santis, A.: Colored visual cryptography without color darkening. Theor. Comput. Sci. 374, 261–276 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  7. Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  8. De Santis, A., Masucci, B.: New results on non-perfect sharing of multiple secrets. J. Syst. Software 80, 216–223 (2007)

    Article  Google Scholar 

  9. Shamir, A.: How to share a secret. Commun. ACM 22, 612–613 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  10. Wang, R., Su, C.: Secret image sharing with smaller shadow images. Pattern Recognition Lett. 27, 551–555 (2006)

    Article  Google Scholar 

  11. Wang, D., Zhang, L., Ma, N., Li, X.: Two secret sharing schemes based on Boolean operations. Pattern Recognition 40(10), 2776–2785 (2007)

    Article  MATH  Google Scholar 

  12. Yang, C.N.: New visual secret sharing scheme using probabilistic method. Pattern Recongnition Lett. 25(4), 481–494 (2004)

    Article  Google Scholar 

  13. Wolfram, S.: A new kind of science. Wolfram Media, Champaign, Illinois (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

del Rey, Á.M., Sánchez, G.R. (2009). A Secret Sharing Scheme for Digital Images Based on Cellular Automata and Boolean Functions. In: Cabestany, J., Sandoval, F., Prieto, A., Corchado, J.M. (eds) Bio-Inspired Systems: Computational and Ambient Intelligence. IWANN 2009. Lecture Notes in Computer Science, vol 5517. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02478-8_150

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-02478-8_150

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-02477-1

  • Online ISBN: 978-3-642-02478-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics