A (k, n) multi-secret image sharing scheme based on Chinese remainder theorem and Arnold cat map

被引:2
|
作者
Chanu, Oinam B. [1 ]
Neelima, Arambam [1 ]
机构
[1] Natl Inst Technol Nagaland, Dept Comp Sci & Engn, Dimapur, India
关键词
Arnold cat map transform; Chinese remainder theorem; randomization; authorized participants; threshold; AUTHENTICATION; (N;
D O I
10.1117/1.JEI.30.2.023004
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A multi-secret image sharing (MSIS) scheme is a procedure to break down secret images into numerous shares and distribute each share to each authorized participant. Most existing (n, n) schemes face the problem of all-or-nothing that is all the n shares are required to reconstruct a secret image. If a single share is lost, then the secret image will not be recovered. Moreover, the existing (k, n) MSIS schemes either require k consecutive shares or general access structure to recover the secret images. The proposed scheme addresses the previous schemes' issues. It is based on Arnold cat map, Chinese remainder theorem (CRT), and Boolean operation. It is a (k, n) threshold scheme where k is the threshold, and n is the number of participants. Arnold cat map is adopted for the randomization of images, and Boolean operation is used for producing public share images. CRT is utilized for the recovery of images. It has high fault tolerance capability as any of the k participants can submit their shares to reconstruct images and consume less computational time due to employing the modular method. Moreover, it can withstand differential as well as statistical attacks. (C) 2021 SPIE and IS&T
引用
收藏
页数:23
相关论文
共 50 条
  • [1] Multi-secret Threshold Sharing Scheme Based on Chinese Remainder Theorem
    Song, Yinong
    Li, Zichen
    [J]. 2024 4TH INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND SOFTWARE ENGINEERING, ICICSE 2024, 2024, : 131 - 135
  • [2] A cheater identifiable multi-secret sharing scheme based on the Chinese remainder theorem
    Chen, Zhenhua
    Li, Shundong
    Zhu, Youwen
    Yan, Jianhua
    Xu, Xinli
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3592 - 3601
  • [3] (k, n) threshold secret image sharing scheme based on Chinese remainder theorem with authenticability
    Fei Hu
    Weihai Li
    Nenghai Yu
    [J]. Multimedia Tools and Applications, 2024, 83 : 40713 - 40732
  • [4] (k, n) threshold secret image sharing scheme based on Chinese remainder theorem with authenticability
    Hu, Fei
    Li, Weihai
    Yu, Nenghai
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (14) : 40713 - 40732
  • [5] Authenticable dynamic quantum multi-secret sharing based on the Chinese remainder theorem
    Li, Lele
    Han, Zhaowei
    Li, Zhihui
    Guan, Feiting
    Zhang, Li
    [J]. QUANTUM INFORMATION PROCESSING, 2024, 23 (02)
  • [6] Authenticable dynamic quantum multi-secret sharing based on the Chinese remainder theorem
    Lele Li
    Zhaowei Han
    Zhihui Li
    Feiting Guan
    Li Zhang
    [J]. Quantum Information Processing, 23
  • [7] Multi-Stage Multi-Secret Sharing Schemes Based on Chinese Remainder Theorem
    Chanu, Oinam Bidyapati
    Tentu, Appala Naidu
    Venkaiah, V. Ch
    [J]. ICARCSET'15: PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON ADVANCED RESEARCH IN COMPUTER SCIENCE ENGINEERING & TECHNOLOGY (ICARCSET - 2015), 2015,
  • [8] SECRET IMAGE SHARING BASED ON CHAOTIC MAP AND CHINESE REMAINDER THEOREM
    Hu, Chunqiang
    Liao, Xiaofeng
    Xiao, Di
    [J]. INTERNATIONAL JOURNAL OF WAVELETS MULTIRESOLUTION AND INFORMATION PROCESSING, 2012, 10 (03)
  • [9] A secret image sharing scheme based on piecewise linear chaotic map and Chinese remainder theorem
    Wei Hua
    Xiaofeng Liao
    [J]. Multimedia Tools and Applications, 2017, 76 : 7087 - 7103
  • [10] A secret image sharing scheme based on piecewise linear chaotic map and Chinese remainder theorem
    Hua, Wei
    Liao, Xiaofeng
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (05) : 7087 - 7103