Skip to main content

Advertisement

Log in

Multi-secret image sharing based on elementary cellular automata with steganography

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper presents a new Multi-Secret Image Sharing (MSIS) scheme with steganography, based on elementary cellular automata (ECA). A particular type of ECA, with behavior of generating some attractors which are called unary attractors, is used to share the secret images. The shares and the authentication strings, produced by a cryptographic hash function, are then embedded in color images using mod4-based operation in such a way that visual quality of stego are preserved as much as possible. The proposed scheme is verifiable as well, because a cryptographic hash function is used for secret images. Based on our experiments, the share images satisfy randomization which ensures the security of the proposed algorithm. Also, influence of similarity of some secret images is analyzed, the results ensures the completely deference between the shared images in the case of the similarity between two secret images. Moreover, the experimental results show that the embedded algorithm improves a good quality acceptable by a human eye of stego images. In addition, the proposed embedded algorithm has a good resistance against noise attack, and cropping attack. Compared with related secret sharing schemes, the proposed scheme provides most of desirable aspects such as verification, hiding shares, and also a linear computational complexity.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Abdo AA, Shiguo Lian IA, Ismail M, Amin H, Diab A (2013) Cryptosystem based on elementary cellular automata. Commun Nonlinear Sci Numer Simulat 18:136–147

    MathSciNet  MATH  Google Scholar 

  2. Aljawarneh S, Yassein MB (2017) A resource-efficient encryption algorithm for multimedia big data. Multimed Tools Appl. https://doi.org/10.1007/s11042-016-4333-y

  3. Aljawarneh SA, Moftah RA, Maatuk AM (2016) Investigations of automatic methods for detecting the polymorphic worms signatures. Futur Gener Comput Syst 60:67–77

    Google Scholar 

  4. Alvarez G, Hernandez Encinas L, Martin del Rey A (2008) A multisecret sharing scheme for color images based on cellular automata. Inf Sci 178:4382–4395

    MATH  Google Scholar 

  5. Anghelescu P, Sofron E, Iana G, Ionescu V (2005) Pseudo-random pattern generators based on cellular automata, ECAI 2005, Romania- Pitesti, p 41-46, ISSN-1453-1119

  6. Blakley GR (1979) Safeguarding cryptographic keys. AFIPS Conf Proc 48:313–317

    Google Scholar 

  7. Chen CC, Chen JL (2017) A new Boolean-based multiple secret image sharing scheme to share different sized secret images. J Inf Secur Appl 33:1–10

    Google Scholar 

  8. Chen CC, Wu WJ (2014) A secure Boolean-based multi-secret image sharing scheme. J Syst Softw 92:107–114

    Google Scholar 

  9. Chen CC, Wu WJ, Chen JL (2016) Highly efficient secure multi secret image sharing scheme. Multimed Tools Appl 75(12):7113–7128

    Google Scholar 

  10. Chen TH, Wu CS (2011) Efficient multi-secret image sharing based on Boolean operations. Signal Process 97(1):91–97

    MATH  Google Scholar 

  11. Eslami Z, Ahmadabadi JZ (2010) A verifiable multi-secret sharing scheme based on cellular automata. Inf Sci 180(15):2889–2894

    MathSciNet  MATH  Google Scholar 

  12. Eslami Z, Razzaghi SH, Zarepour AJ (2010) Secret image sharing based on cellular automata and steganography. Pattern Recogn 43:397–404

    MATH  Google Scholar 

  13. Esposito XS, Aljawarneh SA, Choi C (2018) Securing collaborative deep learning in industrial applications within adversarial scenarios. IEEE Trans Ind Inf 14 (11):4972–4981

    Google Scholar 

  14. Fuster-Sabat A, Caballero-Gil JP (2006) On the use of cellular automata in symmetric cryptography. Acta Appl Math 93:215–236

    MathSciNet  MATH  Google Scholar 

  15. Guo C, Zhang H, Song QQ, Li MC (2016) A multi-threshold secret image sharing scheme based on the generalized Chinese remainder theorem. Multimed Tools Appl 75(18):11577–11594

    Google Scholar 

  16. Hu WT, Li MC, Guo C, Yuan LF (2015) A reversible steganography scheme of secret image sharing based on cellular automata and least significant bits construction. Math Probl Eng. https://doi.org/10.1155/2015/849768

  17. Jeon JC, Yoo b KY (2008) Elliptic curve based hardware architecture using cellular automata. Math Comput Simul 79:1197–1203

    MathSciNet  MATH  Google Scholar 

  18. Jun J (2012) An image encryption based on elementary cellular automata. Opt Lasers Eng 50(12):1836–1843

    Google Scholar 

  19. Kim HS, Yoo KY (2003) Cellular automata based multiplier for public-key cryptosystem, security in pervasive computing, LNCS 2802, pp 227-236

  20. Li Y, Yuanxiang L, Xuewen X (2008) Image encryption algorithm based on self-adaptive symmetrical-coupled toggle cellular automata. Congr Image Signal Process 3:32–36

    Google Scholar 

  21. Maleki F, Mohades A, Mehdi Hashemi S, Shiri ME (2008) An image encryption system by cellular automata with memory. In: The third international conference on availability, reliability and security, pp 1266–1271

  22. Martin RA, Mateus J et al (2005) A secret sharing scheme based on cellular automata. Appl Math Comput 170:1356–64

    MathSciNet  MATH  Google Scholar 

  23. Mervat A, Osama Y (2017) Secret image sharing based on elementary cellular automata. In: International conference on AISI, pp 832–843

  24. Miros LS, Franciszek S (2008) CA-based s-boxes for secure ciphers. Intell Inf Syst, 99–110. ISBN 978-83-60434-44-4

  25. Pevny T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forensic Secur 5(2):215–224

    Google Scholar 

  26. Rukhin A (2008) Statistical test suite for random and pseudorandom number generators for cryptographic applications. NIST Special Publ 1:800–22

    Google Scholar 

  27. Seredinsky M, Bouvry P (2004) Block encryption using reversible cellular automata, ACRI The Netherlands - Amsterdam; LNCS 3305, pp 785-792

  28. Shamir A (1979) How to share a secret. Commun ACM 22:612–613

    MathSciNet  MATH  Google Scholar 

  29. Somanath T, Sukumar N (2009) LCASE: lightweight cellular automata based on symmetric-key encryption. Int J Netw Secur 8(2):243–252

    Google Scholar 

  30. Theien CC, Lin JC (2002) Secret image sharing. Comput Graphics 26:765–770

    Google Scholar 

  31. Tso HK (2008) Sharing secret images using Blakley’s concept. Opt Eng 47:077001

    Google Scholar 

  32. Ulutas G, Ulutas M, Nabiyev V (2013) Secret image sharing scheme with adaptive authentication strength. Pattern Recognit Lett 34:283–291

    MATH  Google Scholar 

  33. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13 (4):600–612

    Google Scholar 

  34. Wu X, Ou D, Liang Q, Sun W (2012) A user-friendly secret image sharing scheme with reversible steganography based on cellular automata. J Syst Softw 85(8):1852–1863

    Google Scholar 

  35. Yang CN, Chen CH, Cai SR (2015) Enhanced Boolean-based multi secret image sharing scheme. J Syst Softw 116:22–34

    Google Scholar 

  36. Yassein MB, Aljawarneh S, Wahsheh Y (2016) Hybrid real-time protection system for online social networks. Found Sci 60:67–77

    Google Scholar 

  37. Zarepour-Ahmadabadi J, Ahmadabadi MS, Latif A (2016) An adaptive secret image sharing with a new bitwise steganographic property. Inf Sci 369:467–480

    MathSciNet  Google Scholar 

  38. Zarepour-Ahmadabadi1 J, Ahmadabadi ME, Latif A (2018) A cellular automata-based multi-stage secret image. Multimed Tools Appl. https://doi.org/10.1007/s11042-018-5717-y

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Azza A.A..

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Azza A.A., Lian, S. Multi-secret image sharing based on elementary cellular automata with steganography. Multimed Tools Appl 79, 21241–21264 (2020). https://doi.org/10.1007/s11042-020-08823-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-08823-8

Keywords

Navigation