Abstract
This paper proposes image encryption and decryption process using new transformation matrix. The image is divided into zones .The zones are constructed from blocks of size 3 x 3 using secret key. All the zones are combined together to form a new transformation matrix and is used for encryption purpose. The sender sends the secret in the form of polynomial’s function value for their ID value. The receiver reconstructs the secret from the polynomial’s function value. Then form the transformation matrix and decrypt it to get the original image. The comparison of the proposed method with the Cross Chaotic map image encryption method [7] reveals that the proposed method is higher in security and superior in encryption quality and also the share to be sent is smaller.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Runhua, S., Hong, Z., Liusheng, H., Yonglong, L.: A (t,n) Secret Sharing Scheme for Image encryption. In: 2008 Congress on Image and Signal Processing Proceeding of IEEE (2008)
Shamir, A.: How to Share a Secret. Communication. ACM 22, 612–613 (1979)
Naor, M.: Visual Cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 441–449. Springer, Heidelberg (1994)
Zhenfu, C.: A threshold key escrow based on public key cryptosystem. In: Science in China (Series E ), pp. 441–448 (2001)
Lerma, M.A.: Modular Arithmetic (2005), http://www.math.northwestern.edu/~mlerma/problem_solving/results/modular_arith.pdf
Lukac, R., Plataniotis, K.N.: A Secret Sharing Scheme for Image Encryption. In: 46th International Symposium Electronics in Marine, EIMAR 2004, pp. 549–554 (2004)
Wang, L., Ye, Q., Xiao, Y., Zou, Y., Zhang, B.: An Image Encryption Scheme Based on Cross Chaotic Map. In: Proc. IEEE 2008 Congress on Image and Signal Processing, pp. 22–26 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kalai Selvi, A., Mohamed Sathik, M. (2010). Secret Sharing Scheme for Image Encryption Using new Transformation Matrix. In: Das, V.V., Vijaykumar, R. (eds) Information and Communication Technologies. ICT 2010. Communications in Computer and Information Science, vol 101. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15766-0_113
Download citation
DOI: https://doi.org/10.1007/978-3-642-15766-0_113
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-15765-3
Online ISBN: 978-3-642-15766-0
eBook Packages: Computer ScienceComputer Science (R0)