{"title":"A cost-effective encryption scheme for color images","authors":"Rastislav Lukac, Konstantinos N. Plataniotis","doi":"10.1016/j.rti.2005.05.002","DOIUrl":null,"url":null,"abstract":"<div><p><span><span>A new secret sharing scheme suitable for encrypting color images is introduced. The scheme, which can be viewed as a cost-effective, private-key cryptosystem, encrypts the secret color image into two color shares with dimensions identical to those of the original secret input. </span>Cryptographic operations<span> performed at the bit levels are used to alter both the spectral correlation among the RGB color components and the </span></span>spatial correlation<span><span> of the neighboring color vectors in the secret image<span>. The original image is decrypted with perfect reconstruction using inverse logical operations which are applied to the noise-like color shares. The scheme can be used in secure transmission of digital imaging material over untrusted networks or it can serve as stand-alone image </span></span>encryption solution.</span></p></div>","PeriodicalId":101062,"journal":{"name":"Real-Time Imaging","volume":"11 5","pages":"Pages 454-464"},"PeriodicalIF":0.0000,"publicationDate":"2005-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.rti.2005.05.002","citationCount":"31","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Real-Time Imaging","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1077201405000355","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 31
Abstract
A new secret sharing scheme suitable for encrypting color images is introduced. The scheme, which can be viewed as a cost-effective, private-key cryptosystem, encrypts the secret color image into two color shares with dimensions identical to those of the original secret input. Cryptographic operations performed at the bit levels are used to alter both the spectral correlation among the RGB color components and the spatial correlation of the neighboring color vectors in the secret image. The original image is decrypted with perfect reconstruction using inverse logical operations which are applied to the noise-like color shares. The scheme can be used in secure transmission of digital imaging material over untrusted networks or it can serve as stand-alone image encryption solution.