稳健的秘密彩色图像共享,防止共享中的裁剪和篡改

IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Journal of Information Security and Applications Pub Date : 2024-09-01 DOI:10.1016/j.jisa.2024.103869
Shengyang Luo, Yaqi Liu, Xuehu Yan, Yuyuan Sun
{"title":"稳健的秘密彩色图像共享,防止共享中的裁剪和篡改","authors":"Shengyang Luo,&nbsp;Yaqi Liu,&nbsp;Xuehu Yan,&nbsp;Yuyuan Sun","doi":"10.1016/j.jisa.2024.103869","DOIUrl":null,"url":null,"abstract":"<div><p>Secret image sharing (SIS) has excellent properties such as loss tolerance and relatively low computational complexity, providing a brand-new solution for image security protection. However, there has been little research on the robustness of SIS systems, such as how to resist cropping or malicious tampering in shares. Existing related schemes generally focus on grayscale images and suffer from issues such as lossy recovery, weak robustness, and serious pixel expansion, which are challenging to meet the requirements of high-quality sensitive image applications. In this regard, a robust SIS scheme for color images is proposed, which can resist large-scale cropping and malicious tampering in shares. According to the idea of “breaking up the whole cropped area into parts, repairing the shares independently”, the proposed scheme can realize lossless recovery of secret images through organic fusion of secret sharing, error-correcting code, and pixel re-arrangement techniques. Even if all the shares are cropped by 25%, it can still achieve lossless recovery regardless of whether the cropping positions intersect or overlap. It can also resist various malicious tampering (such as marking, defacing, and copy-move forgery) as well as image noise. Moreover, it avoids pixel expansion and requires no auxiliary encryption or preprocessing. Theoretical analysis and experimental results demonstrate that the proposed scheme is superior to existing schemes in terms of robustness and comprehensive performance, and is expected to promote the practical application of SIS.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"85 ","pages":"Article 103869"},"PeriodicalIF":3.8000,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Robust secret color image sharing anti-cropping and tampering in shares\",\"authors\":\"Shengyang Luo,&nbsp;Yaqi Liu,&nbsp;Xuehu Yan,&nbsp;Yuyuan Sun\",\"doi\":\"10.1016/j.jisa.2024.103869\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>Secret image sharing (SIS) has excellent properties such as loss tolerance and relatively low computational complexity, providing a brand-new solution for image security protection. However, there has been little research on the robustness of SIS systems, such as how to resist cropping or malicious tampering in shares. Existing related schemes generally focus on grayscale images and suffer from issues such as lossy recovery, weak robustness, and serious pixel expansion, which are challenging to meet the requirements of high-quality sensitive image applications. In this regard, a robust SIS scheme for color images is proposed, which can resist large-scale cropping and malicious tampering in shares. According to the idea of “breaking up the whole cropped area into parts, repairing the shares independently”, the proposed scheme can realize lossless recovery of secret images through organic fusion of secret sharing, error-correcting code, and pixel re-arrangement techniques. Even if all the shares are cropped by 25%, it can still achieve lossless recovery regardless of whether the cropping positions intersect or overlap. It can also resist various malicious tampering (such as marking, defacing, and copy-move forgery) as well as image noise. Moreover, it avoids pixel expansion and requires no auxiliary encryption or preprocessing. Theoretical analysis and experimental results demonstrate that the proposed scheme is superior to existing schemes in terms of robustness and comprehensive performance, and is expected to promote the practical application of SIS.</p></div>\",\"PeriodicalId\":48638,\"journal\":{\"name\":\"Journal of Information Security and Applications\",\"volume\":\"85 \",\"pages\":\"Article 103869\"},\"PeriodicalIF\":3.8000,\"publicationDate\":\"2024-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Information Security and Applications\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2214212624001716\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Security and Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214212624001716","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

秘密图像共享(SIS)具有抗丢失和计算复杂度相对较低等优良特性,为图像安全保护提供了一种全新的解决方案。然而,人们对 SIS 系统的鲁棒性,如如何抵御共享中的裁剪或恶意篡改等问题研究甚少。现有的相关方案一般侧重于灰度图像,存在有损恢复、鲁棒性弱、像素扩展严重等问题,难以满足高质量敏感图像应用的要求。为此,本文提出了一种针对彩色图像的鲁棒 SIS 方案,该方案可抵御大规模裁剪和恶意篡改份额。该方案按照 "整体分割、独立修复 "的思路,将秘密共享技术、纠错码技术和像素重排技术有机融合,实现了秘密图像的无损恢复。即使将所有份额裁剪 25%,无论裁剪位置是相交还是重叠,都能实现无损恢复。它还能抵御各种恶意篡改(如标记、污损和复制移动伪造)以及图像噪声。此外,它还避免了像素扩展,无需辅助加密或预处理。理论分析和实验结果表明,所提出的方案在鲁棒性和综合性能方面均优于现有方案,有望推动 SIS 的实际应用。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Robust secret color image sharing anti-cropping and tampering in shares

Secret image sharing (SIS) has excellent properties such as loss tolerance and relatively low computational complexity, providing a brand-new solution for image security protection. However, there has been little research on the robustness of SIS systems, such as how to resist cropping or malicious tampering in shares. Existing related schemes generally focus on grayscale images and suffer from issues such as lossy recovery, weak robustness, and serious pixel expansion, which are challenging to meet the requirements of high-quality sensitive image applications. In this regard, a robust SIS scheme for color images is proposed, which can resist large-scale cropping and malicious tampering in shares. According to the idea of “breaking up the whole cropped area into parts, repairing the shares independently”, the proposed scheme can realize lossless recovery of secret images through organic fusion of secret sharing, error-correcting code, and pixel re-arrangement techniques. Even if all the shares are cropped by 25%, it can still achieve lossless recovery regardless of whether the cropping positions intersect or overlap. It can also resist various malicious tampering (such as marking, defacing, and copy-move forgery) as well as image noise. Moreover, it avoids pixel expansion and requires no auxiliary encryption or preprocessing. Theoretical analysis and experimental results demonstrate that the proposed scheme is superior to existing schemes in terms of robustness and comprehensive performance, and is expected to promote the practical application of SIS.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Journal of Information Security and Applications
Journal of Information Security and Applications Computer Science-Computer Networks and Communications
CiteScore
10.90
自引率
5.40%
发文量
206
审稿时长
56 days
期刊介绍: Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.
期刊最新文献
Fed-LSAE: Thwarting poisoning attacks against federated cyber threat detection system via Autoencoder-based latent space inspection Lightweight privacy-preserving authenticated key agreements using physically unclonable functions for internet of drones BCRS-DS: A Privacy-protected data sharing scheme for IoT based on blockchain and certificateless ring signature Privacy-preserving verifiable fuzzy phrase search over cloud-based data Robust coverless video steganography based on pose estimation and object tracking
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1