66
Views
6
CrossRef citations to date
0
Altmetric
Original Articles

Secured secret sharing technique based on chaotic map and DNA encoding with application on secret image

&
Pages 460-470 | Received 14 Sep 2015, Accepted 18 Sep 2016, Published online: 22 Dec 2016

References

  • Shamir, A. How to share a secret? Commun. ACM, 1979, 22, (11), 612–613. doi: 10.1145/359168.359176
  • Blakley, G. R. Safeguarding cryptographic keys. Proceedings of ‘National Computer Conference’, Montvale, NJ, 1979, AFI-PS Press, vol. 48, pp. 313–317.
  • Asmuth, C., and Bloom, J. A modular approach to key safeguarding. IEEE Trans. Inform. Theory, 1983, 29, (2), 208–210. doi: 10.1109/TIT.1983.1056651
  • Thien, C.-C., Lin, J.-C. Secret image sharing. Comput. Graph., 2002, 26, (5), 765–770. doi: 10.1016/S0097-8493(02)00131-0
  • Kaya, K. and Selçuk, A. A. Threshold cryptography based on Asmuth-Bloom secret sharing. Inform. Sci., 2007, 177, (19), 4148–4160. doi: 10.1016/j.ins.2007.04.008
  • Wang, D., Zhang, L., Ma, N. and Li, X. Two secret sharing schemes based on Boolean operations. Pattern Recogn., 2007, 40, (10), 2776–2785. doi: 10.1016/j.patcog.2006.11.018
  • Dong, L. and Ku, M. Novel (n, n) secret image sharing scheme based on addition. Sixth International Conference on ‘Intelligent Information Hiding and Multimedia Signal Processing’, 2010, pp. 583–586.
  • Nag, A., Singh, J. P., Sarkar, D., Sarkar, P. P. and Biswas, S. Distortion free secret image sharing based on X-OR operation. International Conference on ‘Communications, Devices and Intelligent Systems (CODIS)’, IEEE, 2012, pp. 286–289.
  • Naskar, P. K., Chaudhuri, A., Basu, D. and Chaudhuri, A. A novel image secret sharing scheme. International Conference on ‘Emerging Applications of Information Technology’, IEEE, 2011, pp. 177–180.
  • Naskar, P. K., Khan, H. N., Roy, U., Chaudhuri, A. and Chaudhuri, A. Shared cryptography with embedded session key for secret audio. Int. J. Comput. Appl., 2011, 26, (8), 5–9.
  • Naskar, P. K., Khan, H. N., Roy, U., Chaudhuri, A. and Chaudhuri, A. Secret image sharing with embedded session key. Int. Conf. CISIM 2011, 2011, 245, 286–294.
  • Jakhar, J., Dey, P., Dutta, M. and Bhattacharyya, D. K. CellTCS:A Secure threshold cryptography scheme based on non-linear hybrid cellular automata. Procedia Technol. 2012, 6, 947–953. doi: 10.1016/j.protcy.2012.10.115
  • Nandakumar, A., Amritha, P. P., Lakshmy, K. V. and Talluri, V. S. Nonlinear secret sharing for gray scale images. Procedia Eng., 2012, 30, 945–952. doi: 10.1016/j.proeng.2012.01.949
  • Wu, K.-S. A secret image sharing scheme for light images. EURASIP J. Adv. Signal Process., 2013, 49, 1–5.
  • Chen, C.-C. and Fu, W.-Y. A geometry based secret image sharing approach. J. Inform. Sci. Eng., 2008, 24, (5), 1567–1577.
  • Ulutas, G., Ulutas, M. and Nabiyev, V. Distortion free geometry base secret image sharing. WCIT-2010, Proc. Comput. Sci., 2011, 3, 721–726.
  • Wu, C.-C., Hwang, M.-S. and Kao, S.-J. A new approach to the secret image sharing with steganography and authentication. Imag. Sci. J., 2009, 57, (3), 140–151. doi: 10.1179/174313109X459887
  • Wu, C.-C., Kao, S.-J. and Hwang, M.-S. A high quality image sharing with steganography and adaptive authentication scheme. J. Syst. Softw., 2011, 84, (12), 2196–2207. doi: 10.1016/j.jss.2011.06.021
  • Chang, C.-C., Hsieh, Y.-P. and Lin, C.-H. Sharing secrets in Stego images with authentication. Pattern Recogn., 2008, 41, (10), 3130–3137. doi: 10.1016/j.patcog.2008.04.006
  • Shin, S.-H., Lee, G.-J. and Yoo, K.-Y. Nonlinear secret image sharing scheme. Scientific World J., 2014, 2014, 1–7.
  • Feng, J.-B., Wu, H.-C., Tsai, C.-S. and Chu, Y.-P. A new multi secret image sharing scheme using Lagrange’s interpolation. J. Syst. Softw. 2005, 76, (3), 327–339. doi: 10.1016/j.jss.2004.07.250
  • Askari, N., Moloney, C. and Heys, H. M. A novel visual secret sharing scheme without image size expansion. IEEE Canadian Conference on ‘Electrical and Computer Engineering (CCECE)’, 2012, pp. 1–4.
  • Salehi, S. and Balafar, M. A. Visual multi secret sharing by cylindrical random grid. J. Inform. Security Appl., 2014, 19, (3), 245–255. doi: 10.1016/j.jisa.2014.05.003
  • Jiao, S. and Goutte, R. Code for encryption hiding data into genomic DNA of living organisms. Proceedings of the ‘9th International Conference on Signal Processing (ICSP’08)’, China, 2008, pp. 2166–2169.
  • Enayatifar, R., Abdullah, A. H. and Isnin, I. F. Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Optics Lasers Eng., 2014, 56, 83–93. doi: 10.1016/j.optlaseng.2013.12.003
  • Pareek, N. K., Patidar, V. and Sud, K. K. Image encryption using chaotic logistic map. Image Vision Comput., 2006, 24, (9), 926–934. doi: 10.1016/j.imavis.2006.02.021
  • Kanso, A., Smaoui, N. Logistic chaotic maps for binary numbers generations. Chaos Solitons Fractals, 2009, 40, (5), 2557–2568. doi: 10.1016/j.chaos.2007.10.049
  • Naskar, P. K. and Chaudhuri, A. A robust image encryption technique using dual chaotic map. Int. J. Electronic Security Digital Forensics, 2015, 7, (4), 358–380. doi: 10.1504/IJESDF.2015.072180

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.