Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

A Secret Sharing Scheme for Secure Transmission of Color Images


Affiliations
1 M.Tech (CSE), USIT, G.G.S.I.P. University, Delhi, India
     

   Subscribe/Renew Journal


Secret sharing is a very secure and efficient way through which we transmit a color image from one user to another user over a network. In this paper we give a method to generate a secret through multiple images. Based on secure image schemes, an effective and generalized scheme of color image hiding is proposed by means of numerical computations; we form a key and generate the secret image by using deformation (d) and formation (f) algorithms. In this paper we are going to present a new scheme for securing color images by hackers and intruders. It is a matrix computation scheme which uses the concept of secret sharing and key safeguarding. This paper proves that proposed scheme is more efficient and secure in terms of secret sharing as well as key safeguarding.

Keywords

Secret Sharing, Key Safeguarding, Security
Subscription Login to verify subscription
User
Notifications
Font Size


  • A. Shamir, “How to Share a Secret,” Communications of ACM,” 1979.
  • G. R. Harn and H. Y. Lin, “An i-span Generalized Secret Sharing Scheme”, In Proc.12th Annual International Cryptography conference, Aug 1992, California, USA.
  • G. R. Blakley, “Safeguarding cryptographic keys,” I. Proc. of the National Computer Conference (NCC), AFIPS Conference Proceedings, vol. 48, pp. 313-317, 1979.
  • C. Blundo, A.D. Santis, M. Naor, “Visual Cryptography for grey level images,” Information Processing Letters, vol. 75, pp. 255-259, 2000.
  • C. -C. Thien, J. -C. Lin, “Secret image sharing,” Computers and Graphics, Vol. 26, pp.765-770, 2002.
  • M. Naor and A.Shamir, “Visual Cryptography,” Advances in Cryptology: Eupocrypt’ 94, Springer- Verlag, Berlin, pp. 1-12, 1995.
  • R. Brinkman, .M. Doumen, P.H. Hartel, and W.Jonker ”Using secret sharing for searching in encrypted data,” In W. Jonker and M. Petkovi c, editors, secure Data Management VLDB 2004 workshop, vol. LNCS 3178, pp. 18-27, Toronto Canada, Augest 2004.
  • C. C. Lin and W. H. Tsai, “Secret Image Sharing with Staganogarphy and authentication,”Journal of System and Software, vol.73,pp 405-411, 2004.
  • C. C. Lin and W. H. Tsai, “Secret Image Sharing Scheme,” Journal of System and software ,vol.31, pp 267-272, 1997.
  • Chien-Chang Chen, Wen-Yin Fu, Chaur-Chin Chen,”A Geometry based Image Sharing Approach ” Proc. IVCNZ (Image and Vision Computing, Newzeland), 28-29 Nov., 2005.
  • Hasimoto, K. Matsuo, A. Koike and Y. Minami, “Hierarchical Secret Image Sharing Method using JPEG 2000 Codestream Syntax , 13th European Signal Processing Conference(EUCIPCO 2005), Sept. 2005, Antalya, Turkey.

Abstract Views: 359

PDF Views: 2




  • A Secret Sharing Scheme for Secure Transmission of Color Images

Abstract Views: 359  |  PDF Views: 2

Authors

Mayank Arya Chandra
M.Tech (CSE), USIT, G.G.S.I.P. University, Delhi, India
Mithlesh Kumari
M.Tech (CSE), USIT, G.G.S.I.P. University, Delhi, India
Kanika Talwar
M.Tech (CSE), USIT, G.G.S.I.P. University, Delhi, India

Abstract


Secret sharing is a very secure and efficient way through which we transmit a color image from one user to another user over a network. In this paper we give a method to generate a secret through multiple images. Based on secure image schemes, an effective and generalized scheme of color image hiding is proposed by means of numerical computations; we form a key and generate the secret image by using deformation (d) and formation (f) algorithms. In this paper we are going to present a new scheme for securing color images by hackers and intruders. It is a matrix computation scheme which uses the concept of secret sharing and key safeguarding. This paper proves that proposed scheme is more efficient and secure in terms of secret sharing as well as key safeguarding.

Keywords


Secret Sharing, Key Safeguarding, Security

References