Skip to main content

2017 | OriginalPaper | Buchkapitel

A Novel Visual Secret Sharing Scheme Using Affine Cipher and Image Interleaving

verfasst von : Harkeerat Kaur, Aparajita Ojha

Erschienen in: Proceedings of International Conference on Computer Vision and Image Processing

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Recently an interesting image sharing method for gray level images using Hill Cipher and RG-method has been introduced by Chen [1]. The method does not involve pixel expansion and image recovery is lossless. However, use of Hill Cipher requires a \(2\times 2\) integer matrix whose inverse should also be an integer matrix. Further, to extend the method for multi-secret sharing, one requires higher order integer matrices. This needs heavy computation and the choice of matrices is also very restricted, due to integer entry constraints. In the present paper we introduce an RG-based Visual Secret Sharing Scheme (VSS) scheme using image interleaving and affine cipher. Combined effect of image interleaving and affine transformation helps in improving the security of the secret images. Parameters of the affine cipher serve as keys and the random grid and encrypted image form the shares. No one can reveal the secret unless the keys and both the shares are known. Further, as opposed to the method in [1], the present scheme does not require invertible matrix with integer inverse. The scheme is also extended for multi-secret sharing.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Chen, W.K.: Image sharing method for gray-level images. Journal of Systems and Software 86 (2013) 581–585CrossRef Chen, W.K.: Image sharing method for gray-level images. Journal of Systems and Software 86 (2013) 581–585CrossRef
2.
Zurück zum Zitat Naor, M., Shamir, A.: Visual cryptography. In: Advances in Cryptology EUROCRYPT’94, Springer (1995) 1–12 Naor, M., Shamir, A.: Visual cryptography. In: Advances in Cryptology EUROCRYPT’94, Springer (1995) 1–12
3.
Zurück zum Zitat Kafri, O., Keren, E.: Encryption of pictures and shapes by random grids. Optics letters 12 (1987) 377–379CrossRef Kafri, O., Keren, E.: Encryption of pictures and shapes by random grids. Optics letters 12 (1987) 377–379CrossRef
4.
Zurück zum Zitat Shyu, S.J.: Image encryption by multiple random grids. Pattern Recognition 42 (2009) 1582–1596CrossRefMATH Shyu, S.J.: Image encryption by multiple random grids. Pattern Recognition 42 (2009) 1582–1596CrossRefMATH
5.
Zurück zum Zitat Chen, T.H., Tsao, K.H.: Threshold visual secret sharing by random grids. Journal of Systems and Software 84 (2011) 1197–1208CrossRef Chen, T.H., Tsao, K.H.: Threshold visual secret sharing by random grids. Journal of Systems and Software 84 (2011) 1197–1208CrossRef
6.
Zurück zum Zitat Guo, T., Liu, F., Wu, C.: k out of k extended visual cryptography scheme by random grids. Signal Processing 94 (2014) 90–101CrossRef Guo, T., Liu, F., Wu, C.: k out of k extended visual cryptography scheme by random grids. Signal Processing 94 (2014) 90–101CrossRef
7.
Zurück zum Zitat Wu, X., Sun, W.: Improved tagged visual cryptography by random grids. Signal Processing 97 (2014) 64–82CrossRef Wu, X., Sun, W.: Improved tagged visual cryptography by random grids. Signal Processing 97 (2014) 64–82CrossRef
8.
Zurück zum Zitat William, S., Stallings, W.: Cryptography and Network Security, 4/E. Pearson Education India (2006) William, S., Stallings, W.: Cryptography and Network Security, 4/E. Pearson Education India (2006)
9.
Zurück zum Zitat De Palma, P., Frank, C., Gladfelter, S., Holden, J.: Cryptography and computer security for undergraduates. In: ACM SIGCSE Bulletin. Volume 36., ACM (2004) 94–95 De Palma, P., Frank, C., Gladfelter, S., Holden, J.: Cryptography and computer security for undergraduates. In: ACM SIGCSE Bulletin. Volume 36., ACM (2004) 94–95
10.
Zurück zum Zitat Shyu, S.J., Huang, S.Y., Lee, Y.K., Wang, R.Z., Chen, K.: Sharing multiple secrets in visual cryptography. Pattern Recognition 40 (2007) 3633–3651CrossRefMATH Shyu, S.J., Huang, S.Y., Lee, Y.K., Wang, R.Z., Chen, K.: Sharing multiple secrets in visual cryptography. Pattern Recognition 40 (2007) 3633–3651CrossRefMATH
11.
Zurück zum Zitat Chen, L., Wu, C.: A study on visual cryptography. Diss. Master Thesis, National Chiao Tung University, Taiwan, ROC (1998) Chen, L., Wu, C.: A study on visual cryptography. Diss. Master Thesis, National Chiao Tung University, Taiwan, ROC (1998)
12.
Zurück zum Zitat Feng, J.B., Wu, H.C., Tsai, C.S., Chang, Y.F., Chu, Y.P.: Visual secret sharing for multiple secrets. Pattern Recognition 41 (2008) 3572–3581CrossRefMATH Feng, J.B., Wu, H.C., Tsai, C.S., Chang, Y.F., Chu, Y.P.: Visual secret sharing for multiple secrets. Pattern Recognition 41 (2008) 3572–3581CrossRefMATH
13.
Zurück zum Zitat Hsu, H.C., Chen, T.S., Lin, Y.H.: The ringed shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharing. In: Networking, Sensing and Control, 2004 IEEE International Conference on. Volume 2., IEEE (2004) 996–1001 Hsu, H.C., Chen, T.S., Lin, Y.H.: The ringed shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharing. In: Networking, Sensing and Control, 2004 IEEE International Conference on. Volume 2., IEEE (2004) 996–1001
14.
Zurück zum Zitat Bunker, S.C., Barasa, M., Ojha, A.: Linear equation based visual secret sharing scheme. In: Advance Computing Conference (IACC), 2014 IEEE International, 2014 IEEE (2014) 406–410 Bunker, S.C., Barasa, M., Ojha, A.: Linear equation based visual secret sharing scheme. In: Advance Computing Conference (IACC), 2014 IEEE International, 2014 IEEE (2014) 406–410
Metadaten
Titel
A Novel Visual Secret Sharing Scheme Using Affine Cipher and Image Interleaving
verfasst von
Harkeerat Kaur
Aparajita Ojha
Copyright-Jahr
2017
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-2107-7_7

Neuer Inhalt