Abstract
In this paper a new secret sharing scheme for digital images is introduced. It is based on the use of very simple two-dimensional linear cellular automata and their algebraic properties. It is shown that the scheme presented is ideal and perfect.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Álvarez, G., Hernández, L., Martín, A.: A New Secret Sharing Scheme for Images based on Additive 2-Dimensional Cellular Automata. In: Marques, J.S., Pérez de la Blanca, N., Pina, P. (eds.) IbPRIA 2005. LNCS, vol. 3522, pp. 411–418. Springer, Heidelberg (2005)
Blakley, G.R.: Safeguarding cryptographic keys. AFIPS Conf. Proc. 48, 313–317 (1979)
Chaudhuri, P., Chowdhury, D., Nandi, S., Chattopadhyay, S.: Additive cellular automata. In: Theory and Applications, vol. 1, IEEE Computer Society Press, Los Alamitos (1997)
Chang, C., Hwang, R.: Sharing secret images using shadow codebooks, Inform. Sciences 111, 335–345 (1998)
Chen, Y., Chan, Y., Huang, Ch., Tsai, M., Chu, Y.: A multiple-level visual secret-sharing scheme without image size expansion. Inform. Sciences 177, 4696–4710 (2007)
Cimato, S., De Prisco, R., De Santis, A.: Colored visual cryptography without color darkening. Theor. Comput. Sci. 374, 261–276 (2007)
Feng, J., Wu, H., Tsai, C., Chu, Y.: A new multi-secret image sharing scheme using Lagrange’s interpolation. J. Syst. Software 76, 327–329 (2005)
Fredkin, E.: Digital mechanics. An informal process based on reversible universal cellular automata, Physica D 45, 254–270 (1990)
Lin, S., Lin, J.: VCPSS: A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches. Pattern Recogn. 40, 3652–3666 (2007)
Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)
Martín del Rey, A., Rodríguez Sánchez, G.: On the reversibility of 150 Wolfram cellular automata. Int. J. Mod. Phys. C 17, 975–984 (2006)
Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton, FL (1997)
De Santis, A., Masucci, B.: New results on non-perfect sharing of multiple secrets. J. Syst. Software 80, 216–223 (2007)
Shamir, A.: How to share a secret, Commun. ACM 22, 612–613 (1979)
Shyu, S.: Efficient visual secret sharing scheme for color images. Pattern Recogn. 39, 866–880 (2006)
Thien, C., Lin, J.: Secret image sharing. Compup. Graph. 26, 765–770 (2002)
Toffoli, T., Margolus, N.: Cellular automata machines. The MIT Press, Cambridge, MA (1987)
Tsai, D., Chen, T., Horng, G.: A cheating prevention scheme for binary visual cryptography with homogeneous secret images. Pattern Recogn. 40, 2356–2366 (2007)
von Neumann, J.: Theory of self-reproducing automata (edited and completed by A.W. Burks). University of Illinois Press, Illinois (1966)
Wang, R., Su, C.: Secret image sharing with smaller shadow images. Pattern Recogn. Lett. 27, 551–555 (2006)
Wolfram, S.: A new kind of science, Wolfram Media. Champaign, Illinois (2002)
Wu, Y., Thien, L., Lin, J.: Sharing and hiding secret images with size constrain. Pattern Recogn. 37, 1377–1385 (2004)
Yang, C., Chen, T.: Reduce shadow size in aspect ratio invariant visual secret sharing schemes using a square block-wise operation. Pattern Recogn. 39, 1300–1314 (2006)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
del Rey, A.M. (2008). A Secret Sharing Scheme for Digital Images Based on Two-Dimensional Linear Cellular Automata. In: Brimkov, V.E., Barneva, R.P., Hauptman, H.A. (eds) Combinatorial Image Analysis. IWCIA 2008. Lecture Notes in Computer Science, vol 4958. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-78275-9_28
Download citation
DOI: https://doi.org/10.1007/978-3-540-78275-9_28
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-78274-2
Online ISBN: 978-3-540-78275-9
eBook Packages: Computer ScienceComputer Science (R0)