Abstract
Massive computing on cloud infrastructure had achieved remarkable consideration and popularity in recent years. However, security and privacy issues are also emerging as cloud infrastructures are deployed and maintained by third parties. In this paper, we propose a simple method to secure an image for privacy-preserving storage over cloud infrastructure. One-dimensional chaotic logistic map is used to divide the secret image into two shares such that no image information is revealed. Secure shares are generated using chaotic key stream derived from one-dimensional chaotic map. For successful decryption, both the shares are gathered and secret image is revealed. The proposed method is secure and simple, and involves less complex operations. Different experimental tests have been performed to demonstrate security aspects of the proposed scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Schneier, B.: Applied Cryptography: Protocols Algorithms and Source Code in C. Wiley, New York, USA (1996)
Liao, X., Lai, S., Zhou, Q.: A novel image encryption algorithm based on self-adaptive wave transmission. Sig. Process. 90(9), 2714–2722 (2010)
Naor, M., Shamir, A.: Visual cryptography. In: Advances in Cryptology—EUROCRYPT’94, pp. 1–12. Springer, Berlin/Heidelberg (1995)
Shankar, K., Eswaran, P.: Sharing a secret image with encapsulated shares in visual cryptography. Procedia Comput. Sci. 70, 462–468 (2015)
Yampolskiy, R.V., Rebolledo-Mendez, J.D., Hindi, M.M.: Password protected visual cryptography via cellular automaton rule 30. In: Transactions on Data Hiding and Multimedia Security IX, pp. 57–67. Springer, Berlin/Heidelberg (2014)
Thien, C.-C., Lin, J.-C.: Secret image sharing. Comput. & Graph. 26(5), 765–770 (2002)
Alharthi, S., Atrey, P.K.: An improved scheme for secret image sharing. In: IEEE International Conference on Multimedia and Expo (ICME), pp. 1661–1666 (2010)
Alharthi, S.S., Atrey, P.K.: Further improvements on secret image sharing scheme. In: Proceedings of the 2nd ACM Workshop on Multimedia in Forensics, Security and Intelligence, pp. 53–58 (2010)
Yoon, J.W., Kim, H.: An image encryption scheme with a pseudorandom permutation based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. https://doi.org/10.1016/j.cnsns.2010.01.041 (2010)
Tong, X., Cui, M.: Image encryption with compound chaotic sequence cipher shifting dynamically. Image Vis. Comput. 26, 843–850 (2008)
Behnia, S., Akhshani, A., Mahmodi, H., Akhavan, A.: A novel algorithm for image encryption based on mixture of chaotic maps. Chaos, Solitons Fractals 35, 408–419 (2008)
Pareek, N.K., Patidar, V., Sud, K.K.: Image encryption using chaotic logistic map. Image Vis. Comput. 24, 926–934 (2006)
Patidar, V., Pareek, N.K., Sud, K.K.: Modified substitution–diffusion image cipher using chaotic standard and logistic maps. Commun. Nonlinear Sci. Numer. Simul. 15, 2755–2765 (2010)
Jolfaei, A., Mirghadri, A.: Image encryption using chaos and block cipher. Comput. Inf. Sci. 4(1), 172–185 (2011)
Guarnong, C., Mao, Y., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons Fractals 21(3), 749–761 (2004)
Chen, G.R., Mayo, Y.B., et. al.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitins & Fractals 21, 749–761 (2004)
Abdo, A.A., Lian, S., Ismail, I.A., Amin, M., Diab, H.: A cryptosystem based on elementary cellular automata. Commun. Nonlinear Sci. Numer. Simul. 18(1), 136–147 (2013)
Xiang, T., Hu, J., Sun, J.: Outsourcing chaotic selective image encryption to the cloud with steganography. Digit. Signal Process. 43, 28–37(2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Sharma, P., Sharma, V. (2019). Secret Image Sharing Over Cloud Using One-Dimensional Chaotic Map. In: Shukla, R.K., Agrawal, J., Sharma, S., Singh Tomer, G. (eds) Data, Engineering and Applications. Springer, Singapore. https://doi.org/10.1007/978-981-13-6351-1_2
Download citation
DOI: https://doi.org/10.1007/978-981-13-6351-1_2
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-6350-4
Online ISBN: 978-981-13-6351-1
eBook Packages: Computer ScienceComputer Science (R0)