A Homomorphic Method for Sharing Secret Images

  • Naveed Islam
  • William Puech
  • Robert Brouzet
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5703)

Abstract

In this paper, we present a new method for sharing images between two parties exploiting homomorphic property of public key cryptosystem. With our method, we show that it is possible to multiply two encrypted images, to decrypt the resulted image and after to extract and reconstruct one of the two original images if the second original image is available. Indeed, extraction and reconstruction of original image at the receiving end is done with the help of carrier image. Experimental results and security analysis show the effectiveness of the proposed scheme.

Keywords

Cryptosystem Homomorphism Image encryption 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Borie, J.C., Puech, W., Dumas, M.: Encrypted Medical Images for Secure Transfer. In: ICDIA 2002, Diagnostic Imaging and Analysis, Shanghai, R.P. China, August 2002, pp. 250–255 (2002)Google Scholar
  2. 2.
    Fontaine, C., Galand, F.: A Survey of Homomorphic Encryption for Nonspecialists. EURASIP Journal Information Security 2007(1), 1–15 (2007)CrossRefGoogle Scholar
  3. 3.
    Gamal, E.: A Public-Key Cryptosystem and a Signature Scheme Based on Discrete logarithms. IEEE Transactions on Information Theory, 469–472 (1985)Google Scholar
  4. 4.
    Kuribayashi, M., Tanaka, H.: Fingerprinting Protocol for Images Based on Additive Homomorphic Property. IEEE Transactions on Image Processing 14(12), 2129–2139 (2005)CrossRefGoogle Scholar
  5. 5.
    Paillier, P.: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  6. 6.
    Prasanna, S.R.M., Rao, Y.V.S., Mitra, A.: An Image Encryption Method with Magnitude and Phase Manipulation using Carrier Images. International Journal of Computer Vision 1(2), 132–137 (2006)Google Scholar
  7. 7.
    Puech, W., Rodrigues, J.M.: A New Crypto-Watermarking Method for Medical Images Safe Transfer. In: Proc. 12th European Signal Processing Conference (EUSIPCO 2004), Vienna, Austria, pp. 1481–1484 (2004)Google Scholar
  8. 8.
    Rappe, D.K.: Homomorphic Cryptosystems and their Applications. Cryptology ePrint Archive, Report 2006/001 (2006)Google Scholar
  9. 9.
    Schneier, B.: Applied cryptography. Wiley, New-York (1995)MATHGoogle Scholar
  10. 10.
    Uhl, A., Pommer, A.: Image and Video Encryption: From Digital Rights Management to Secured Personal Communication. Springer, Heidelberg (2005)MATHGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Naveed Islam
    • 1
  • William Puech
    • 1
  • Robert Brouzet
    • 2
  1. 1.LIRMM Laboratory, UMR 5506 CNRSUniversity of Montpellier IIMontpellierFrance
  2. 2.I3M Laboratory, UMR 5149 CNRSUniversity of Montpellier IIMontpellierFrance

Personalised recommendations