Secure image secret sharing over distributed cloud network

作者: Xiaotian Wu , Ching-Nung Yang , Jian-Ming Li

DOI: 10.1016/J.SIGPRO.2020.107768

关键词: Theoretical computer scienceCloud computingSecret sharingProtocol (object-oriented programming)Property (programming)Computer scienceKey distributionImage (mathematics)

摘要: Abstract A (k, n)-threshold secret image sharing (SIS) scheme protects a by dividing it into n shadow images. When any k or more images are collected, the is reconstructed. While ( − 1 ) fewer shadows give no clue about secret. However, all previous SIS schemes do not deal with secure recovery over distributed cloud network (DCN). To achieve goal that reconstructing DCN, private communication channels among involved participants holding required. naive solution for this problem to use an extra key distribution protocol delivers common participants. In paper, two n)-SIS DCN (SISDCN) introduced, where threshold property (recover from images) and reconstruction (noninteractively share participants) provided. Further, theoretical analysis, experiments comparisons conducted show effectiveness advantages of proposed schemes.

参考文章(40)
Zhihua Xia, Xinhui Wang, Xingming Sun, Qian Wang, A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data IEEE Transactions on Parallel and Distributed Systems. ,vol. 27, pp. 340- 352 ,(2016) , 10.1109/TPDS.2015.2401003
Ran-Zan Wang, Shyong-Jian Shyu, Scalable secret image sharing Signal Processing-image Communication. ,vol. 22, pp. 363- 373 ,(2007) , 10.1016/J.IMAGE.2006.12.012
Ching-Nung Yang, Tse-Shih Chen, Kun Hsuan Yu, Chung-Chun Wang, Improvements of image sharing with steganography and authentication Journal of Systems and Software. ,vol. 80, pp. 1070- 1076 ,(2007) , 10.1016/J.JSS.2006.11.022
Ching-Nung Yang, Sin-Ming Huang, Constructions and properties of k out of n scalable secret image sharing Optics Communications. ,vol. 283, pp. 1750- 1762 ,(2010) , 10.1016/J.OPTCOM.2009.12.077
Ching-Nung Yang, Chuei-Bang Ciou, Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability Image and Vision Computing. ,vol. 28, pp. 1600- 1610 ,(2010) , 10.1016/J.IMAVIS.2010.04.003
Ching-Nung Yang, Peng Li, Chih-Cheng Wu, Song-Ruei Cai, Reducing shadow size in essential secret image sharing by conjunctive hierarchical approach Signal Processing-image Communication. ,vol. 31, pp. 1- 9 ,(2015) , 10.1016/J.IMAGE.2014.11.003
Chih-Ching Thien, Ja-Chen Lin, Secret image sharing Computers & Graphics. ,vol. 26, pp. 765- 770 ,(2002) , 10.1016/S0097-8493(02)00131-0
Chin-Chen Chang, Yi-Pei Hsieh, Chia-Hsuan Lin, Sharing secrets in stego images with authentication Pattern Recognition. ,vol. 41, pp. 3130- 3137 ,(2008) , 10.1016/J.PATCOG.2008.04.006
Jian Li, Xiaolong Li, Bin Yang, Xingming Sun, Segmentation-Based Image Copy-Move Forgery Detection Scheme IEEE Transactions on Information Forensics and Security. ,vol. 10, pp. 507- 518 ,(2015) , 10.1109/TIFS.2014.2381872
Ran-Zan Wang, Chin-Hui Su, Secret image sharing with smaller shadow images Pattern Recognition Letters. ,vol. 27, pp. 551- 555 ,(2006) , 10.1016/J.PATREC.2005.09.021