Skip to main content

Secret Sharing Scheme for Image Encryption Using new Transformation Matrix

  • Conference paper
Information and Communication Technologies (ICT 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 101))

  • 1279 Accesses

Abstract

This paper proposes image encryption and decryption process using new transformation matrix. The image is divided into zones .The zones are constructed from blocks of size 3 x 3 using secret key. All the zones are combined together to form a new transformation matrix and is used for encryption purpose. The sender sends the secret in the form of polynomial’s function value for their ID value. The receiver reconstructs the secret from the polynomial’s function value. Then form the transformation matrix and decrypt it to get the original image. The comparison of the proposed method with the Cross Chaotic map image encryption method [7] reveals that the proposed method is higher in security and superior in encryption quality and also the share to be sent is smaller.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Runhua, S., Hong, Z., Liusheng, H., Yonglong, L.: A (t,n) Secret Sharing Scheme for Image encryption. In: 2008 Congress on Image and Signal Processing Proceeding of IEEE (2008)

    Google Scholar 

  2. Shamir, A.: How to Share a Secret. Communication. ACM 22, 612–613 (1979)

    Article  MATH  MathSciNet  Google Scholar 

  3. Naor, M.: Visual Cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 441–449. Springer, Heidelberg (1994)

    Google Scholar 

  4. Zhenfu, C.: A threshold key escrow based on public key cryptosystem. In: Science in China (Series E ), pp. 441–448 (2001)

    Google Scholar 

  5. Lerma, M.A.: Modular Arithmetic (2005), http://www.math.northwestern.edu/~mlerma/problem_solving/results/modular_arith.pdf

  6. Lukac, R., Plataniotis, K.N.: A Secret Sharing Scheme for Image Encryption. In: 46th International Symposium Electronics in Marine, EIMAR 2004, pp. 549–554 (2004)

    Google Scholar 

  7. Wang, L., Ye, Q., Xiao, Y., Zou, Y., Zhang, B.: An Image Encryption Scheme Based on Cross Chaotic Map. In: Proc. IEEE 2008 Congress on Image and Signal Processing, pp. 22–26 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kalai Selvi, A., Mohamed Sathik, M. (2010). Secret Sharing Scheme for Image Encryption Using new Transformation Matrix. In: Das, V.V., Vijaykumar, R. (eds) Information and Communication Technologies. ICT 2010. Communications in Computer and Information Science, vol 101. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15766-0_113

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-15766-0_113

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-15765-3

  • Online ISBN: 978-3-642-15766-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics