Abstract
This paper presents a new Multi-Secret Image Sharing (MSIS) scheme with steganography, based on elementary cellular automata (ECA). A particular type of ECA, with behavior of generating some attractors which are called unary attractors, is used to share the secret images. The shares and the authentication strings, produced by a cryptographic hash function, are then embedded in color images using mod4-based operation in such a way that visual quality of stego are preserved as much as possible. The proposed scheme is verifiable as well, because a cryptographic hash function is used for secret images. Based on our experiments, the share images satisfy randomization which ensures the security of the proposed algorithm. Also, influence of similarity of some secret images is analyzed, the results ensures the completely deference between the shared images in the case of the similarity between two secret images. Moreover, the experimental results show that the embedded algorithm improves a good quality acceptable by a human eye of stego images. In addition, the proposed embedded algorithm has a good resistance against noise attack, and cropping attack. Compared with related secret sharing schemes, the proposed scheme provides most of desirable aspects such as verification, hiding shares, and also a linear computational complexity.
Similar content being viewed by others
References
Abdo AA, Shiguo Lian IA, Ismail M, Amin H, Diab A (2013) Cryptosystem based on elementary cellular automata. Commun Nonlinear Sci Numer Simulat 18:136–147
Aljawarneh S, Yassein MB (2017) A resource-efficient encryption algorithm for multimedia big data. Multimed Tools Appl. https://doi.org/10.1007/s11042-016-4333-y
Aljawarneh SA, Moftah RA, Maatuk AM (2016) Investigations of automatic methods for detecting the polymorphic worms signatures. Futur Gener Comput Syst 60:67–77
Alvarez G, Hernandez Encinas L, Martin del Rey A (2008) A multisecret sharing scheme for color images based on cellular automata. Inf Sci 178:4382–4395
Anghelescu P, Sofron E, Iana G, Ionescu V (2005) Pseudo-random pattern generators based on cellular automata, ECAI 2005, Romania- Pitesti, p 41-46, ISSN-1453-1119
Blakley GR (1979) Safeguarding cryptographic keys. AFIPS Conf Proc 48:313–317
Chen CC, Chen JL (2017) A new Boolean-based multiple secret image sharing scheme to share different sized secret images. J Inf Secur Appl 33:1–10
Chen CC, Wu WJ (2014) A secure Boolean-based multi-secret image sharing scheme. J Syst Softw 92:107–114
Chen CC, Wu WJ, Chen JL (2016) Highly efficient secure multi secret image sharing scheme. Multimed Tools Appl 75(12):7113–7128
Chen TH, Wu CS (2011) Efficient multi-secret image sharing based on Boolean operations. Signal Process 97(1):91–97
Eslami Z, Ahmadabadi JZ (2010) A verifiable multi-secret sharing scheme based on cellular automata. Inf Sci 180(15):2889–2894
Eslami Z, Razzaghi SH, Zarepour AJ (2010) Secret image sharing based on cellular automata and steganography. Pattern Recogn 43:397–404
Esposito XS, Aljawarneh SA, Choi C (2018) Securing collaborative deep learning in industrial applications within adversarial scenarios. IEEE Trans Ind Inf 14 (11):4972–4981
Fuster-Sabat A, Caballero-Gil JP (2006) On the use of cellular automata in symmetric cryptography. Acta Appl Math 93:215–236
Guo C, Zhang H, Song QQ, Li MC (2016) A multi-threshold secret image sharing scheme based on the generalized Chinese remainder theorem. Multimed Tools Appl 75(18):11577–11594
Hu WT, Li MC, Guo C, Yuan LF (2015) A reversible steganography scheme of secret image sharing based on cellular automata and least significant bits construction. Math Probl Eng. https://doi.org/10.1155/2015/849768
Jeon JC, Yoo b KY (2008) Elliptic curve based hardware architecture using cellular automata. Math Comput Simul 79:1197–1203
Jun J (2012) An image encryption based on elementary cellular automata. Opt Lasers Eng 50(12):1836–1843
Kim HS, Yoo KY (2003) Cellular automata based multiplier for public-key cryptosystem, security in pervasive computing, LNCS 2802, pp 227-236
Li Y, Yuanxiang L, Xuewen X (2008) Image encryption algorithm based on self-adaptive symmetrical-coupled toggle cellular automata. Congr Image Signal Process 3:32–36
Maleki F, Mohades A, Mehdi Hashemi S, Shiri ME (2008) An image encryption system by cellular automata with memory. In: The third international conference on availability, reliability and security, pp 1266–1271
Martin RA, Mateus J et al (2005) A secret sharing scheme based on cellular automata. Appl Math Comput 170:1356–64
Mervat A, Osama Y (2017) Secret image sharing based on elementary cellular automata. In: International conference on AISI, pp 832–843
Miros LS, Franciszek S (2008) CA-based s-boxes for secure ciphers. Intell Inf Syst, 99–110. ISBN 978-83-60434-44-4
Pevny T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forensic Secur 5(2):215–224
Rukhin A (2008) Statistical test suite for random and pseudorandom number generators for cryptographic applications. NIST Special Publ 1:800–22
Seredinsky M, Bouvry P (2004) Block encryption using reversible cellular automata, ACRI The Netherlands - Amsterdam; LNCS 3305, pp 785-792
Shamir A (1979) How to share a secret. Commun ACM 22:612–613
Somanath T, Sukumar N (2009) LCASE: lightweight cellular automata based on symmetric-key encryption. Int J Netw Secur 8(2):243–252
Theien CC, Lin JC (2002) Secret image sharing. Comput Graphics 26:765–770
Tso HK (2008) Sharing secret images using Blakley’s concept. Opt Eng 47:077001
Ulutas G, Ulutas M, Nabiyev V (2013) Secret image sharing scheme with adaptive authentication strength. Pattern Recognit Lett 34:283–291
Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13 (4):600–612
Wu X, Ou D, Liang Q, Sun W (2012) A user-friendly secret image sharing scheme with reversible steganography based on cellular automata. J Syst Softw 85(8):1852–1863
Yang CN, Chen CH, Cai SR (2015) Enhanced Boolean-based multi secret image sharing scheme. J Syst Softw 116:22–34
Yassein MB, Aljawarneh S, Wahsheh Y (2016) Hybrid real-time protection system for online social networks. Found Sci 60:67–77
Zarepour-Ahmadabadi J, Ahmadabadi MS, Latif A (2016) An adaptive secret image sharing with a new bitwise steganographic property. Inf Sci 369:467–480
Zarepour-Ahmadabadi1 J, Ahmadabadi ME, Latif A (2018) A cellular automata-based multi-stage secret image. Multimed Tools Appl. https://doi.org/10.1007/s11042-018-5717-y
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Azza A.A., Lian, S. Multi-secret image sharing based on elementary cellular automata with steganography. Multimed Tools Appl 79, 21241–21264 (2020). https://doi.org/10.1007/s11042-020-08823-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-08823-8