Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3627345.3627351acmotherconferencesArticle/Chapter ViewAbstractPublication PagescciotConference Proceedingsconference-collections
research-article

Pixel-based Visual Secret Sharing Using Lorenz System

Published: 04 December 2023 Publication History

Abstract

(n, n)-Visual Secret Sharing (VSS) allows a user to send an image in the form of shares to different participants. Every share can not reveal the secret alone, and only all shares together can reveal the secret with fast recovery. This paper proposes a pixel-based (n, n)-VSS system, where to share a pixel from the secret image, (n − 1) random pixels are generated from the Lorenz chaotic system for a varying set of (n − 1) shares. Then, the nth pixel is calculated for a random share using the secret pixel and the generated (n − 1) random pixels. The system is efficient, lossless, implemented for grayscale and color images, and has a simple XOR-based recovery scheme. It passed several security analysis tests and is robust against noise attacks. Moreover, performance analysis and comparisons with other VSS systems are presented, showing good results.

References

[1]
John Blesswin A, Christhu Raj, Rajeev Sukumaran, and Selva Mary G. 2019. Enhanced semantic visual secret sharing scheme for the secure image communication. Multimedia Tools and Applications 79, 23-24 (April 2019), 17057–17079. https://doi.org/10.1007/s11042-019-7535-2
[2]
Sherif H. AbdElHaleem, Salwa K. Abd-El-Hafiz, and Ahmed G. Radwan. 2022. A generalized framework for elliptic curves based PRNG and its utilization in image encryption. Scientific Reports 12 (12 2022), 13278. Issue 1. https://doi.org/10.1038/s41598-022-17045-x
[3]
Lawrence Bassham, Andrew Rukhin, Juan Soto, James Nechvatal, Miles Smid, Stefan Leigh, M Levenson, M Vangel, Nathanael Heckert, and D Banks. 2010. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications.
[4]
Pei-Ling Chiu and Kai-Hui Lee. 2020. Threshold Visual Cryptography Schemes With Tagged Shares. IEEE Access 8 (2020), 111330–111346. https://doi.org/10.1109/ACCESS.2020.3000308
[5]
Louis Cianciullo and Hossein Ghodosi. 2021. Outsourced cheating detection for secret sharing. International Journal of Information Security 20, 6 (Jan. 2021), 871–878. https://doi.org/10.1007/s10207-021-00538-7
[6]
Yusheng Guo, Xingxing Jia, Qimeng Chu, and Daoshun Wang. 2020. A Novel XOR-Based Threshold Visual Cryptography with Adjustable Pixel Expansion. Applied Sciences 10, 4 (Feb. 2020), 1321. https://doi.org/10.3390/app10041321
[7]
Sheng-Yao Huang, An hui Lo, and Justie Su-Tzu Juan. 2022. XOR-Based Meaningful (n, n) Visual Multi-Secrets Sharing Schemes. Applied Sciences 12, 20 (Oct. 2022), 10368. https://doi.org/10.3390/app122010368
[8]
Andrea Huszti, Szabolcs Kovács, and Norbert Oláh. 2022. Scalable, password-based and threshold authentication for smart homes. International Journal of Information Security 21, 4 (Feb. 2022), 707–723. https://doi.org/10.1007/s10207-022-00578-7
[9]
Dyala R. Ibrahim, Je Sen Teh, and Rosni Abdullah. 2021. An overview of visual cryptography techniques. Multimedia Tools and Applications 80 (9 2021), 31927–31952. Issue 21-23. https://doi.org/10.1007/s11042-021-11229-9
[10]
Suresh Prasad Kannojia and Jasvant Kumar. 2021. XOR-based visual secret sharing scheme using pixel vectorization. Multimedia Tools and Applications 80 (4 2021), 14609–14635. Issue 10. https://doi.org/10.1007/s11042-020-10352-3
[11]
Peng Li, Jianfeng Ma, Liping Yin, and Quan Ma. 2020. A Construction Method of (2, 3) Visual Cryptography Scheme. IEEE Access 8 (2020), 32840–32849. https://doi.org/10.1109/ACCESS.2020.2973659
[12]
Zuquan Liu, Guopu Zhu, Feng Ding, and Sam Kwong. 2021. Weighted visual secret sharing for general access structures based on random grids. Signal Processing: Image Communication 92 (March 2021), 116129. https://doi.org/10.1016/j.image.2020.116129
[13]
Moni Naor and Adi Shamir. 1995. Visual cryptography. Advances in Cryptology — EUROCRYPT’94 (1995). https://doi.org/10.1007/BFb0053419
[14]
Dinesh Pande, Arjun Singh Rawat, Maroti Deshmukh, and Maheep Singh. 2023. Single Secret Sharing Scheme Using Chinese Remainder Theorem, Modified Shamir’s Scheme and XOR Operation. Wireless Personal Communications 130, 2 (March 2023), 957–985. https://doi.org/10.1007/s11277-023-10315-5
[15]
A.G. Radwan, S.H. AbdElHaleem, and S.K. Abd-El-Hafiz. 2016. Symmetric encryption algorithms using chaotic and non-chaotic generators: A review. Journal of Advanced Research 7, 2 (2016), 193–208. https://doi.org/10.1016/j.jare.2015.07.002
[16]
W. S. Sayed, A. G. Radwan, M. Elnawawy, H. Orabi, A. Sagahyroon, F. Aloul, A. S. Elwakil, H. A. Fahmy, and A. El-Sedeek. 2019. Two-Dimensional Rotation of Chaotic Attractors: Demonstrative Examples and FPGA Realization. Circuits, Systems, and Signal Processing 38, 10 (April 2019), 4890–4903. https://doi.org/10.1007/s00034-019-01096-z
[17]
Bishoy K. Sharobim, Salwa K. Abd-El-Hafiz, Wafaa S. Sayed, Lobna A. Said, and Ahmed G. Radwan. 2022. A Secured Lossless Visual Secret Sharing for Color Images Using Arnold Transform. In 2022 International Conference on Microelectronics (ICM). https://doi.org/10.1109/icm56065.2022.10005395
[18]
Bishoy K. Sharobim, Marwan A. Fetteha, Salwa K. Abd-El-Hafiz, Wafaa S. Sayed, Lobna A. Said, and Ahmed G. Radwan. 2023. An Efficient Multi-Secret Image Sharing System Based on Chinese Remainder Theorem and Its FPGA Realization. IEEE Access 11 (2023), 9511–9520. https://doi.org/10.1109/access.2023.3240202
[19]
Srividhya Sridhar and Gnanou Florence Sudha. 2020. Quality improved (k, n) priority based progressive visual secret sharing. Multimedia Tools and Applications 79, 17-18 (Jan. 2020), 11459–11486. https://doi.org/10.1007/s11042-019-08319-0
[20]
Srividhya Sridhar and Gnanou Florence Sudha. 2021. Two in One Image Secret Sharing Scheme (TiOISSS) for extended progressive visual cryptography using simple modular arithmetic operations. Journal of Visual Communication and Image Representation 74 (Jan. 2021), 102996. https://doi.org/10.1016/j.jvcir.2020.102996
[21]
Longdan Tan, Yuliang Lu, Xuehu Yan, Lintao Liu, and Xuan Zhou. 2019. XOR-ed visual secret sharing scheme with robust and meaningful shadows based on QR codes. Multimedia Tools and Applications 79, 9-10 (Dec. 2019), 5719–5741. https://doi.org/10.1007/s11042-019-08351-0
[22]
Song Wan, Lanlan Qi, Guozheng Yang, Yuliang Lu, Xuehu Yan, and Longlong Li. 2019. Visual secret sharing scheme with (n, n) threshold for selective secret content based on QR codes. Multimedia Tools and Applications 79, 3-4 (Dec. 2019), 2789–2811. https://doi.org/10.1007/s11042-019-08246-0
[23]
Lu Wang, Bin Yan, Hong-Mei Yang, and Jeng-Shyang Pan. 2020. Flip Extended Visual Cryptography for Gray-Scale and Color Cover Images. Symmetry 13 (12 2020), 65. Issue 1. https://doi.org/10.3390/sym13010065
[24]
A. Weber. 1997. The USC-SIPI Image Database. https://sipi.usc.edu/database/
[25]
Baiyan Wu, Yuwei Peng, and Chao Wang. 2022. A TTP watermarking protocol based on visual cryptography. Multimedia Tools and Applications 81, 28 (May 2022), 41079–41101. https://doi.org/10.1007/s11042-022-13002-y
[26]
Xuehu Yan, Feng Liu, Wei Qi Yan, Guozheng Yang, and Yuliang Lu. 2020. Weighted visual cryptographic scheme with improved image quality. Multimedia Tools and Applications 79, 29-30 (May 2020), 21345–21360. https://doi.org/10.1007/s11042-020-08970-y
[27]
Xuehu Yan, Lintao Liu, Longlong Li, and Yuliang Lu. 2021. Robust Secret Image Sharing Resistant to Noise in Shares. ACM Transactions on Multimedia Computing, Communications, and Applications 17 (4 2021), 1–22. Issue 1. https://doi.org/10.1145/3419750
[28]
Yongkang Zhao and Fang-Wei Fu. 2022. A cheating immune (k,  n) visual cryptography scheme by using the rotation of shares. Multimedia Tools and Applications 81, 5 (Jan. 2022), 6235–6257. https://doi.org/10.1007/s11042-021-11692-4
[29]
M. Affan Zidan, A. G. Radwan, and K. N. Salama. 2011. The effect of numerical techniques on differential equation based chaotic generators. In ICM 2011 Proceeding. 1–4. https://doi.org/10.1109/ICM.2011.6177395

Cited By

View all
  • (2024)A $(k, n)$-Secret Image Sharing With Steganography Using Generalized Tent Map2024 13th International Conference on Modern Circuits and Systems Technologies (MOCAST)10.1109/MOCAST61810.2024.10615376(01-06)Online publication date: 26-Jun-2024
  • (2024)Software and hardware realizations for different designs of chaos-based secret image sharing systemsJournal of Real-Time Image Processing10.1007/s11554-024-01450-821:3Online publication date: 6-May-2024

Index Terms

  1. Pixel-based Visual Secret Sharing Using Lorenz System

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    CCIOT '23: Proceedings of the 2023 8th International Conference on Cloud Computing and Internet of Things
    September 2023
    170 pages
    ISBN:9798400708046
    DOI:10.1145/3627345
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 04 December 2023

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Chaos
    2. Cryptography
    3. Lorenz System
    4. Visual Secret Sharing

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Funding Sources

    • Science, Technology, and Innovation Funding Authority (STIFA), Egypt

    Conference

    CCIOT 2023

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)14
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 16 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)A $(k, n)$-Secret Image Sharing With Steganography Using Generalized Tent Map2024 13th International Conference on Modern Circuits and Systems Technologies (MOCAST)10.1109/MOCAST61810.2024.10615376(01-06)Online publication date: 26-Jun-2024
    • (2024)Software and hardware realizations for different designs of chaos-based secret image sharing systemsJournal of Real-Time Image Processing10.1007/s11554-024-01450-821:3Online publication date: 6-May-2024

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media