Open Access
Subscription Access
Open Access
Subscription Access
A Secret Sharing Scheme for Secure Transmission of Color Images
Subscribe/Renew Journal
Secret sharing is a very secure and efficient way through which we transmit a color image from one user to another user over a network. In this paper we give a method to generate a secret through multiple images. Based on secure image schemes, an effective and generalized scheme of color image hiding is proposed by means of numerical computations; we form a key and generate the secret image by using deformation (d) and formation (f) algorithms. In this paper we are going to present a new scheme for securing color images by hackers and intruders. It is a matrix computation scheme which uses the concept of secret sharing and key safeguarding. This paper proves that proposed scheme is more efficient and secure in terms of secret sharing as well as key safeguarding.
Keywords
Secret Sharing, Key Safeguarding, Security
Subscription
Login to verify subscription
User
Font Size
Information
- A. Shamir, “How to Share a Secret,” Communications of ACM,” 1979.
- G. R. Harn and H. Y. Lin, “An i-span Generalized Secret Sharing Scheme”, In Proc.12th Annual International Cryptography conference, Aug 1992, California, USA.
- G. R. Blakley, “Safeguarding cryptographic keys,” I. Proc. of the National Computer Conference (NCC), AFIPS Conference Proceedings, vol. 48, pp. 313-317, 1979.
- C. Blundo, A.D. Santis, M. Naor, “Visual Cryptography for grey level images,” Information Processing Letters, vol. 75, pp. 255-259, 2000.
- C. -C. Thien, J. -C. Lin, “Secret image sharing,” Computers and Graphics, Vol. 26, pp.765-770, 2002.
- M. Naor and A.Shamir, “Visual Cryptography,” Advances in Cryptology: Eupocrypt’ 94, Springer- Verlag, Berlin, pp. 1-12, 1995.
- R. Brinkman, .M. Doumen, P.H. Hartel, and W.Jonker ”Using secret sharing for searching in encrypted data,” In W. Jonker and M. Petkovi c, editors, secure Data Management VLDB 2004 workshop, vol. LNCS 3178, pp. 18-27, Toronto Canada, Augest 2004.
- C. C. Lin and W. H. Tsai, “Secret Image Sharing with Staganogarphy and authentication,”Journal of System and Software, vol.73,pp 405-411, 2004.
- C. C. Lin and W. H. Tsai, “Secret Image Sharing Scheme,” Journal of System and software ,vol.31, pp 267-272, 1997.
- Chien-Chang Chen, Wen-Yin Fu, Chaur-Chin Chen,”A Geometry based Image Sharing Approach ” Proc. IVCNZ (Image and Vision Computing, Newzeland), 28-29 Nov., 2005.
- Hasimoto, K. Matsuo, A. Koike and Y. Minami, “Hierarchical Secret Image Sharing Method using JPEG 2000 Codestream Syntax , 13th European Signal Processing Conference(EUCIPCO 2005), Sept. 2005, Antalya, Turkey.
Abstract Views: 359
PDF Views: 2