Secure and Optimal Secret Sharing Scheme for Color Images

被引:5
|
作者
Shankar, K. [1 ]
Taniar, David [2 ]
Yang, Eunmok [3 ]
Yi, Okyeon [3 ]
机构
[1] Univ Fed Piaui, Postgrad Program Elect Engn, BR-64049550 Teresina, Brazil
[2] Monash Univ, Fac Informat Technol, Clayton, Vic 3800, Australia
[3] Kookmin Univ, Dept Informat Secur Cryptol & Math, Seoul 02707, South Korea
关键词
multiple secret image sharing; SIMON ciphers; Particle Swarm Optimization; Cuckoo Search Optimization; Peak Signal to Noise Ratio; metaheuristics; PROGRESSIVE K; (T;
D O I
10.3390/math9192360
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Due to contemporary communication trends, the amount of multimedia data created and transferred in 5G networks has reached record levels. Multimedia applications communicate an enormous quantity of images containing private data that tend to be attacked by cyber-criminals and later used for illegal reasons. Security must consider and adopt the new and unique features of 5G/6G platforms. Cryptographic procedures, especially secret sharing (SS), with some extraordinary qualities and capacities, can be conceived to handle confidential data. This paper has developed a secured (k, k) multiple secret sharing (SKMSS) scheme with Hybrid Optimal SIMON ciphers. The proposed SKMSS method constructs a set of noised components generated securely based on performing hash and block ciphers over the secret image itself. The shares are created and safely sent after encrypting them through the Hybrid Optimal SIMON ciphers based on the noised images. This is a lightweight cryptography method and helps reduce computation complexity. The hybrid Particle Swarm Optimization-based Cuckoo Search Optimization Algorithm generates the keys based on the analysis of the peak signal to noise ratio value of the recovered secret images. In this way, the quality of the secret image is also preserved even after performing more computations upon securing the images.
引用
收藏
页数:22
相关论文
共 50 条
  • [1] A Secret Sharing Scheme for Secure Transmission of Color Images
    Kumar, Hirdesh
    Srivastava, Awadhesh
    [J]. PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON ISSUES AND CHALLENGES IN INTELLIGENT COMPUTING TECHNIQUES (ICICT), 2014, : 857 - 860
  • [2] A secure scheme to share secret color images
    Alvarez, G
    Encinas, AH
    Encinas, LH
    del Rey, AM
    [J]. COMPUTER PHYSICS COMMUNICATIONS, 2005, 173 (1-2) : 9 - 16
  • [3] A {k,n}-secret sharing scheme for color images
    Lukac, R
    Plataniotis, KN
    Venetsanopoulos, AN
    [J]. COMPUTATIONAL SCIENCE - ICCS 2004, PROCEEDINGS, 2004, 3039 : 72 - 79
  • [4] Hierarchical threshold secret sharing scheme for color images
    [J]. Multimedia Tools and Applications, 2017, 76 : 5489 - 5503
  • [5] Hierarchical threshold secret sharing scheme for color images
    Fathimal, Mohamed P.
    Rani, Arockia Jansi P.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (04) : 5489 - 5503
  • [6] Efficient visual secret sharing scheme for color images
    Shyu, SH
    [J]. PATTERN RECOGNITION, 2006, 39 (05) : 866 - 880
  • [7] Secure Visual Secret Sharing Scheme for Color Images Using Visual Cryptography and Digital Watermarking
    Saturwar, Jitendra
    Chaudhari, D. N.
    [J]. PROCEEDINGS OF THE 2017 IEEE SECOND INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND COMMUNICATION TECHNOLOGIES (ICECCT), 2017,
  • [8] Double layer secure secret images sharing scheme for biometrics
    Elavarasi Gunasekaran
    Vanitha Muthuraman
    [J]. Distributed and Parallel Databases, 2022, 40 : 861 - 885
  • [9] Double layer secure secret images sharing scheme for biometrics
    Gunasekaran, Elavarasi
    Muthuraman, Vanitha
    [J]. DISTRIBUTED AND PARALLEL DATABASES, 2022, 40 (04) : 861 - 885
  • [10] A new scheme for sharing secret color images in computer network
    Chang, CC
    Tsai, CS
    Chen, TS
    [J]. SEVENTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, PROCEEDINGS, 2000, : 21 - 27