A (k, n) multi-secret image sharing scheme based on Chinese remainder theorem and Arnold cat map

被引:2
|
作者
Chanu, Oinam B. [1 ]
Neelima, Arambam [1 ]
机构
[1] Natl Inst Technol Nagaland, Dept Comp Sci & Engn, Dimapur, India
关键词
Arnold cat map transform; Chinese remainder theorem; randomization; authorized participants; threshold; AUTHENTICATION; (N;
D O I
10.1117/1.JEI.30.2.023004
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A multi-secret image sharing (MSIS) scheme is a procedure to break down secret images into numerous shares and distribute each share to each authorized participant. Most existing (n, n) schemes face the problem of all-or-nothing that is all the n shares are required to reconstruct a secret image. If a single share is lost, then the secret image will not be recovered. Moreover, the existing (k, n) MSIS schemes either require k consecutive shares or general access structure to recover the secret images. The proposed scheme addresses the previous schemes' issues. It is based on Arnold cat map, Chinese remainder theorem (CRT), and Boolean operation. It is a (k, n) threshold scheme where k is the threshold, and n is the number of participants. Arnold cat map is adopted for the randomization of images, and Boolean operation is used for producing public share images. CRT is utilized for the recovery of images. It has high fault tolerance capability as any of the k participants can submit their shares to reconstruct images and consume less computational time due to employing the modular method. Moreover, it can withstand differential as well as statistical attacks. (C) 2021 SPIE and IS&T
引用
收藏
页数:23
相关论文
共 50 条
  • [41] An efficient Boolean based multi-secret image sharing scheme
    Amitava Nag
    Jyoti Prakash Singh
    Amit Kumar Singh
    [J]. Multimedia Tools and Applications, 2020, 79 : 16219 - 16243
  • [42] An efficient Boolean based multi-secret image sharing scheme
    Nag, Amitava
    Singh, Jyoti Prakash
    Singh, Amit Kumar
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (23-24) : 16219 - 16243
  • [43] A new multi-secret image sharing scheme based on DCT
    Chanu, Oinam Bidyapati
    Neelima, Arambam
    [J]. VISUAL COMPUTER, 2020, 36 (05): : 939 - 950
  • [44] Chinese Remainder Theorem-based Essential Secret Image Sharing
    Liu, Zuquan
    Yang, Jianquan
    Zhu, Guopu
    [J]. 2021 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, INTERNET OF PEOPLE, AND SMART CITY INNOVATIONS (SMARTWORLD/SCALCOM/UIC/ATC/IOP/SCI 2021), 2021, : 75 - 82
  • [45] A (t, n) multi-secret sharing scheme
    Yang, CC
    Chang, TY
    Hwang, MS
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2004, 151 (02) : 483 - 490
  • [46] A (k,t,n) verifiable multi-secret sharing scheme based on adversary structure
    Li, Jing
    Wang, Licheng
    Yan, Jianhua
    Niu, Xinxin
    Yang, Yixian
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (12): : 4552 - 4567
  • [47] A new threshold changeable secret sharing scheme based on the Chinese Remainder Theorem
    Jia, Xingxing
    Wang, Daoshun
    Nie, Daxin
    Luo, Xiangyang
    Sun, Jonathan Zheng
    [J]. INFORMATION SCIENCES, 2019, 473 : 13 - 30
  • [48] A Reversible Data Hiding Scheme in Encrypted Domain for Secret Image Sharing Based on Chinese Remainder Theorem
    Ke, Yan
    Zhang, Minqing
    Zhang, Xinpeng
    Liu, Jia
    Su, Tingting
    Yang, Xiaoyuan
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2022, 32 (04) : 2469 - 2481
  • [49] Multi-Secret Image Sharing Scheme by Boolean Operations
    Chen, Chien-Chang
    Lin, Cheng-Shian
    Chen, Jia-Zhan
    [J]. 2022 IEEE 18TH INTERNATIONAL COLLOQUIUM ON SIGNAL PROCESSING & APPLICATIONS (CSPA 2022), 2022, : 397 - 402
  • [50] Weighted secret sharing based on the chinese remainder theorem
    Harn, Lein
    Fuyou, Miao
    [J]. International Journal of Network Security, 2014, 16 (06) : 420 - 426