Abstract
Values such as cellular sum in initial configurations and neighbor radius can potentially affect confusion and diffusion in cellular automata. Specifically, both confusion and diffusion characteristics in cellular automata usually are not sufficient to break up the high correlation between the secret image pixels when these two parameters are too small. Thus, using only One-Dimensional Reversible Memory Cellular Automata (ODRM-CA) to generate shadow images will lead to the leakage of original secret image’s information by some shadow images. In order to solve this problem, in this paper, we propose an image secret sharing (ISS) scheme with no third-party scrambling method. This is realized by increasing the values of cellular sum and neighbor radius to implement the scrambling process for the secret image, thus both processes of image scrambling and image secret sharing can be achieved by ODRM-CA. Experimental results show that this scheme can generate strong random shadow images to avoid leaking information of the original secret image.
Similar content being viewed by others
References
Bao L, Yi S, Zhou Y (2017) Combination of sharing matrix and image encryption for lossless \((k, n) \)-secret image sharing. IEEE Trans Image Process 26(12):5618–5631
Blakley GR (1979) Safeguarding cryptographic keys. In: AFIPS Conference proceedings, pp 313–317
Chen Y, Chen F, Wu T, Hu W, Xu X (2018) A deep learning model for secure cyber-physical transportation systems. In: IEEE INFOCOM 2018-IEEE conference on computer communications workshops (INFOCOM WKSHPS). IEEE, pp 1–2
Chen Y, Zhang Y, Maharjan S (2017) Deep learning for secure mobile edge computing. arXiv:1709.08025
Eslami Z, Ahmadabadi JZ (2010) A verifiable multi-secret sharing scheme based on cellular automata. Inform Sci 180(15):2889–2894
Eslami Z, Ahmadabadi JZ (2011) Secret image sharing with authentication-chaining and dynamic embedding. J Syst Softw 84(5):803–809
Eslami Z, Razzaghi SH, Ahmadabadi JZ (2010) Secret image sharing based on cellular automata and steganography. Pattern Recogn 43(1):397–404
Guo T, Liu F, Wu CK, Yang CN, Wang W, Ren YW (2013) Threshold secret image sharing. In: Information and communications security. Springer, pp 404–412
Hu WT, Li MC, Guo C, Ren YZ (2012) Reversible secret image sharing with steganography and dynamic embedding. Secur Commun Netw 5(11):1267–1276
Hu WT, Li MC, Guo C, Yuan LF (2015) A reversible steganography scheme of secret image sharing based on cellular automata and least significant bits construction. Math Probl Eng 2015:1–11
Jolfaei A, Wu XW, Muthukkumarasamy V (2016) On the security of permutation-only image encryption schemes. IEEE Trans Inf Forens Secur 11(2):235–246
Kanso A, Ghebleh M (2017) An efficient (t, n)–threshold secret image sharing scheme. Multimed Tools Appl 76(15):16369–16388
Katz J, Lindell Y (2014) Introduction to modern cryptography. CRC Press
Lin PY (2015) Double verification secret sharing mechanism based on adaptive pixel pair matching. ACM Trans Multimed Comput Commun Appl (TOMM) 11(3):36
Liu L, Wang AH, Chang CC, Li ZH (2014) A novel real-time and progressive secret image sharing with flexible shadows based on compressive sensing. Signal Process Image Commun 29(1):128–134
Menezes AJ, Van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC Press, Boca Raton
Ott E (2002) Chaos in dynamical systems. Cambridge University Press
Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613
Thien CC, Lin JC (2002) Secret image sharing. Comput Graph 26(5):765–770
Toffoli T, Margolus NH (1990) Invertible cellular automata - a review. Physica D: Nonlinear Phenom 45 (1-3):229–253
Ulutas G, Ulutas M, Nabiyev VV (2013) Secret image sharing scheme with adaptive authentication strength. Pattern Recogn Lett 34(3):283–291
Voyatzis G, Pitas I (1996) Chaotic mixing of digital images and applications to watermarking. In: Proceedings of European conference on multimedia applications, services and techniques (ECMAST’96), pp 687–695
Wang RZ, Su CH (2006) Secret image sharing with smaller shadow images. Pattern Recogn Lett 27 (6):551–555
Wu XT, Ou DH, Liang QM, Sun W (2012) A user-friendly secret image sharing scheme with reversible steganography based on cellular automata. J Syst Softw 85(8):1852–1863
Wu XT, Sun W (2013) Secret image sharing scheme with authentication and remedy abilities based on cellular automata and discrete wavelet transform. J Syst Softw 86(4):1068–1088
Yang CN, Chang WJ, Cai SR, Lin CY (2014) Secret image sharing without keeping permutation key. In: Information and communications technologies (ICT 2014), pp 1–7
Zhou ZL, Yang CN, Cao Y, Sun XM (2018) Secret image sharing based on encrypted pixels. IEEE Access 6:15021–15025
Acknowledgments
This work is supported by National Natural Science Foundation of China Grant No. 61802097 and Zhejiang Provincial Natural Science Foundation of China (No. LY16F020019).
Author information
Authors and Affiliations
Corresponding author
Appendix
Appendix
Rights and permissions
About this article
Cite this article
Hu, W., Yao, Y., Zhou, D. et al. A Novel Image Secret Sharing Scheme without Third-Party Scrambling Method. Mobile Netw Appl 24, 1317–1335 (2019). https://doi.org/10.1007/s11036-018-1168-y
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-018-1168-y