Sharing a Secret Image in the Cloud Using Two Shadows

Yu Chen, Jiang-Yi Lin, Chinchen Chang, Yu-Chen Hu
{"title":"Sharing a Secret Image in the Cloud Using Two Shadows","authors":"Yu Chen, Jiang-Yi Lin, Chinchen Chang, Yu-Chen Hu","doi":"10.6633/IJNS.202007_22(4).01","DOIUrl":null,"url":null,"abstract":"In this paper, we present a novel (2, 2) reversible secret image sharing scheme. Our scheme permits secret messages to be shared with two participants by splitting the marked encrypted image into two shadows. The secret messages can be reconstructed if two participants collaborate with each other. The proposed scheme chooses suitable binary blocks of a cover image in which to embed the secret message and divides those blocks into two shadow blocks by executing a logical operation with all of the other binary blocks, thereby producing two shadows. In the data extraction procedure, the secret messages and the cover image can be reconstructed by the logical operation of the corresponding binary blocks of the two shadows. A practical application is demonstrated by modeling our scheme as a reversible watermarking scheme in the Cloud. The experimental results indicated that the proposed method is reversible and that it can restore the image and watermark properly.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"45 1","pages":"551-560"},"PeriodicalIF":0.0000,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International journal of network security & its applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.6633/IJNS.202007_22(4).01","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

In this paper, we present a novel (2, 2) reversible secret image sharing scheme. Our scheme permits secret messages to be shared with two participants by splitting the marked encrypted image into two shadows. The secret messages can be reconstructed if two participants collaborate with each other. The proposed scheme chooses suitable binary blocks of a cover image in which to embed the secret message and divides those blocks into two shadow blocks by executing a logical operation with all of the other binary blocks, thereby producing two shadows. In the data extraction procedure, the secret messages and the cover image can be reconstructed by the logical operation of the corresponding binary blocks of the two shadows. A practical application is demonstrated by modeling our scheme as a reversible watermarking scheme in the Cloud. The experimental results indicated that the proposed method is reversible and that it can restore the image and watermark properly.
使用两个阴影在云中共享一个秘密图像
本文提出了一种新的(2,2)可逆秘密图像共享方案。我们的方案通过将标记的加密图像分割成两个阴影来允许两个参与者共享秘密消息。如果两个参与者相互协作,则可以重建秘密消息。该方案从封面图像中选择合适的二进制块来嵌入秘密信息,并对所有其他二进制块进行逻辑运算,将这些块划分为两个阴影块,从而产生两个阴影。在数据提取过程中,通过对两个阴影对应的二进制块进行逻辑运算,可以重构出秘密信息和封面图像。通过将该方案建模为云中的可逆水印方案,验证了该方案的实际应用。实验结果表明,该方法具有可逆性,能较好地恢复图像和水印。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信