Back to Search
Start Over
Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique
- Source :
- Journal of Ambient Intelligence and Humanized Computing. 11:1821-1833
- Publication Year :
- 2018
- Publisher :
- Springer Science and Business Media LLC, 2018.
-
Abstract
- Secret Image Sharing (SIS) scheme is to encrypt a secret image into ānā specious shadows. It is unable to reveal any data on the secret image if at least one of the shadows is not achieved. In this paper, wavelet-based secret image sharing scheme is proposed with encrypted shadow images using optimal Homomorphic Encryption (HE) technique. Initially, Discrete Wavelet Transform (DWT) is applied on the secret image to produce sub bands. From this process, multiple shadows are created, encrypted and decrypted for each shadow. The encrypted shadow can be recovered just by choosing some subset of these ānā shadows that makes transparent and stack over each other. To improve the shadow security, each shadow is encrypted and decrypted using HE technique. For the concern on image quality, the new Oppositional based Harmony Search (OHS) algorithm was utilized to generate the optimal key. From the analysis, it shows that the proposed scheme provide greater security compared to other existing schemes.
- Subjects :
- Discrete wavelet transform
General Computer Science
business.industry
Image quality
Computer science
ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION
Image sharing
Homomorphic encryption
020207 software engineering
02 engineering and technology
Encryption
Wavelet
Shadow
0202 electrical engineering, electronic engineering, information engineering
Key (cryptography)
020201 artificial intelligence & image processing
Computer vision
Artificial intelligence
business
ComputingMethodologies_COMPUTERGRAPHICS
Subjects
Details
- ISSN :
- 18685145 and 18685137
- Volume :
- 11
- Database :
- OpenAIRE
- Journal :
- Journal of Ambient Intelligence and Humanized Computing
- Accession number :
- edsair.doi...........5f8a1d5b200237c5998a1e8563f343c2
- Full Text :
- https://doi.org/10.1007/s12652-018-1161-0