2008
DOI: 10.1016/j.ins.2008.07.010
|View full text |Cite
|
Sign up to set email alerts
|

A multisecret sharing scheme for color images based on cellular automata

Abstract: a b s t r a c tIn this work a new multisecret sharing scheme for secret color images among a set of users is proposed. The protocol allows that each participant in the scheme to share a secret color image with the rest of participants in such a way that all of them can recover all the secret color images only if the whole set of participants pools their shadows. The proposed scheme is based on the use of bidimensional reversible cellular automata with memory. The security of the scheme is studied and it is pro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
32
0
1

Year Published

2009
2009
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 46 publications
(33 citation statements)
references
References 29 publications
0
32
0
1
Order By: Relevance
“…(2) (lowest hierarchical level) takes part in the reconstruction procedure using a stolen ID from participant p 1 (1) . Figure 1c and d show cheating attempts by an outsider, π.…”
Section: Cheating Scenariosmentioning
confidence: 99%
See 2 more Smart Citations
“…(2) (lowest hierarchical level) takes part in the reconstruction procedure using a stolen ID from participant p 1 (1) . Figure 1c and d show cheating attempts by an outsider, π.…”
Section: Cheating Scenariosmentioning
confidence: 99%
“…During the secret-retrieval stage, at least k participants must provide their shares to reveal the secret data; if the aforementioned access structure is not satisfied, then any information regarding the secret data cannot be obtained, i.e., any (k-1) participants cannot access the secret data. Based on the concept of the SS scheme, secret image sharing (SIS) schemes have been proposed as image encryption techniques in which a secret image, instead of secret data, is shared between several participants [1,3,[5][6][7][8][9][10][11][14][15][16].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Cellular automata are distributed systems with a large number of rules that can simulate complicated and pseudorandom behaviors [5]. In recent years, CA has been used for image cryptography in following areas: watermarking [6], [7], secret image sharing [8][9][10][11], and image encryption [12][13][14][15][16][17][18]. The first image encryption system based on cellular automata was designed with one-dimensional elementary CA [16].…”
Section: Introductionmentioning
confidence: 99%
“…For instance multi-value (including ternary) CA models for trac ow are proposed in [6]. Recently, cellular automata have found applications in cryptography [7,8], especially 2D CA have been proposed for multi--secret sharing scheme for colored images [9].…”
Section: Introductionmentioning
confidence: 99%