Skip to main content

Secret Image Sharing Over Cloud Using One-Dimensional Chaotic Map

  • Chapter
  • First Online:
Data, Engineering and Applications

Abstract

Massive computing on cloud infrastructure had achieved remarkable consideration and popularity in recent years. However, security and privacy issues are also emerging as cloud infrastructures are deployed and maintained by third parties. In this paper, we propose a simple method to secure an image for privacy-preserving storage over cloud infrastructure. One-dimensional chaotic logistic map is used to divide the secret image into two shares such that no image information is revealed. Secure shares are generated using chaotic key stream derived from one-dimensional chaotic map. For successful decryption, both the shares are gathered and secret image is revealed. The proposed method is secure and simple, and involves less complex operations. Different experimental tests have been performed to demonstrate security aspects of the proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Schneier, B.: Applied Cryptography: Protocols Algorithms and Source Code in C. Wiley, New York, USA (1996)

    MATH  Google Scholar 

  2. Liao, X., Lai, S., Zhou, Q.: A novel image encryption algorithm based on self-adaptive wave transmission. Sig. Process. 90(9), 2714–2722 (2010)

    Article  Google Scholar 

  3. Naor, M., Shamir, A.: Visual cryptography. In: Advances in Cryptology—EUROCRYPT’94, pp. 1–12. Springer, Berlin/Heidelberg (1995)

    Google Scholar 

  4. Shankar, K., Eswaran, P.: Sharing a secret image with encapsulated shares in visual cryptography. Procedia Comput. Sci. 70, 462–468 (2015)

    Article  Google Scholar 

  5. Yampolskiy, R.V., Rebolledo-Mendez, J.D., Hindi, M.M.: Password protected visual cryptography via cellular automaton rule 30. In: Transactions on Data Hiding and Multimedia Security IX, pp. 57–67. Springer, Berlin/Heidelberg (2014)

    Google Scholar 

  6. Thien, C.-C., Lin, J.-C.: Secret image sharing. Comput. & Graph. 26(5), 765–770 (2002)

    Google Scholar 

  7. Alharthi, S., Atrey, P.K.: An improved scheme for secret image sharing. In: IEEE International Conference on Multimedia and Expo (ICME), pp. 1661–1666 (2010)

    Google Scholar 

  8. Alharthi, S.S., Atrey, P.K.: Further improvements on secret image sharing scheme. In: Proceedings of the 2nd ACM Workshop on Multimedia in Forensics, Security and Intelligence, pp. 53–58 (2010)

    Google Scholar 

  9. Yoon, J.W., Kim, H.: An image encryption scheme with a pseudorandom permutation based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. https://doi.org/10.1016/j.cnsns.2010.01.041 (2010)

  10. Tong, X., Cui, M.: Image encryption with compound chaotic sequence cipher shifting dynamically. Image Vis. Comput. 26, 843–850 (2008)

    Article  Google Scholar 

  11. Behnia, S., Akhshani, A., Mahmodi, H., Akhavan, A.: A novel algorithm for image encryption based on mixture of chaotic maps. Chaos, Solitons Fractals 35, 408–419 (2008)

    Article  MathSciNet  Google Scholar 

  12. Pareek, N.K., Patidar, V., Sud, K.K.: Image encryption using chaotic logistic map. Image Vis. Comput. 24, 926–934 (2006)

    Google Scholar 

  13. Patidar, V., Pareek, N.K., Sud, K.K.: Modified substitution–diffusion image cipher using chaotic standard and logistic maps. Commun. Nonlinear Sci. Numer. Simul. 15, 2755–2765 (2010)

    Google Scholar 

  14. Jolfaei, A., Mirghadri, A.: Image encryption using chaos and block cipher. Comput. Inf. Sci. 4(1), 172–185 (2011)

    Google Scholar 

  15. Guarnong, C., Mao, Y., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons Fractals 21(3), 749–761 (2004)

    Article  MathSciNet  Google Scholar 

  16. Chen, G.R., Mayo, Y.B., et. al.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitins & Fractals 21, 749–761 (2004)

    Google Scholar 

  17. Abdo, A.A., Lian, S., Ismail, I.A., Amin, M., Diab, H.: A cryptosystem based on elementary cellular automata. Commun. Nonlinear Sci. Numer. Simul. 18(1), 136–147 (2013)

    Google Scholar 

  18. Xiang, T., Hu, J., Sun, J.: Outsourcing chaotic selective image encryption to the cloud with steganography. Digit. Signal Process. 43, 28–37(2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Priyamwada Sharma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Sharma, P., Sharma, V. (2019). Secret Image Sharing Over Cloud Using One-Dimensional Chaotic Map. In: Shukla, R.K., Agrawal, J., Sharma, S., Singh Tomer, G. (eds) Data, Engineering and Applications. Springer, Singapore. https://doi.org/10.1007/978-981-13-6351-1_2

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-6351-1_2

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-6350-4

  • Online ISBN: 978-981-13-6351-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics