Reference Hub5
Random Grid and Reversible Watermarking-Based On Verifiable Secret Sharing for Outsourcing Images in Cloud

Random Grid and Reversible Watermarking-Based On Verifiable Secret Sharing for Outsourcing Images in Cloud

Hang Gao, Mengting Hu, Tiegang Gao, Renhong Cheng
Copyright: © 2018 |Volume: 10 |Issue: 1 |Pages: 16
ISSN: 1941-6210|EISSN: 1941-6229|EISBN13: 9781522543602|DOI: 10.4018/IJDCF.2018010103
Cite Article Cite Article

MLA

Gao, Hang, et al. "Random Grid and Reversible Watermarking-Based On Verifiable Secret Sharing for Outsourcing Images in Cloud." IJDCF vol.10, no.1 2018: pp.24-39. http://doi.org/10.4018/IJDCF.2018010103

APA

Gao, H., Hu, M., Gao, T., & Cheng, R. (2018). Random Grid and Reversible Watermarking-Based On Verifiable Secret Sharing for Outsourcing Images in Cloud. International Journal of Digital Crime and Forensics (IJDCF), 10(1), 24-39. http://doi.org/10.4018/IJDCF.2018010103

Chicago

Gao, Hang, et al. "Random Grid and Reversible Watermarking-Based On Verifiable Secret Sharing for Outsourcing Images in Cloud," International Journal of Digital Crime and Forensics (IJDCF) 10, no.1: 24-39. http://doi.org/10.4018/IJDCF.2018010103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

A novel random grid and reversible watermarking based verifiable secret sharing scheme for outsourcing image in cloud is proposed in the paper. In the proposed scheme, data owner firstly embeds the hash value of the secret image into the secret image itself using reversible watermarking algorithm; then, watermarked image is divided into $n$ sub image. Secondly, the hash of n sub image is calculated, and then the hash value is transformed into the initial value of hyper-chaos, thus n random grids are generated by different hyper-chaos. Lastly, after expanding the sub-image to the same size with the original secret image, it is performer XOR operation with the corresponding random grid, this will accordingly produce $n$ sharing secret. In order to securely outsource the image in the cloud, the generated shares are issued to the $n$ different cloud server. For authorized user, (s)he can get shares from different cloud server, and then can recover the original secret image through a series of decryption operations and extraction of reversible watermarking. The proposed scheme can losslessly restore the original secret image, and have the double verification ability, that is to say, it can verify whether the anyone of the sharing is modified, and it can also verify whether the original secret image is completely reconstructed. Some analysis and comparisons are given to show the security and effectiveness of proposed scheme.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.