CT Image Secret Sharing Based on Chaotic Map and Singular Value Decomposition

In order to prevent CT images from being stolen and tampered in telemedicine, a secret sharing method of (n, n) structure is designed and combined with the classical chaotic digital image encryption method. The method consists of three parts: In the first part, singular value decomposition is used to generate the key of the Henon chaotic map and CT subgraphs; in the second part, the Henon map is used to generate chaotic sequences of scramble CT subgraphs. Then a valueless image selected by the user is used as an impurity image, the diffusing operation is completed by a XOR operation between the impurity image and the image obtained by the scrambling operation. Finally, the image obtained by the diffusing operation is divided into multiple parts by the secret sharing method designed in this paper and embedded into the cover images selected by the user to generate several shadow images. The third part is the decryption part, and the decryptor completes the decryption when all the shadow images, impurity image and keys are collected. Several experiments have shown that this method has excellent performance in the test of ciphertext statistical characteristics, sensitivity, PSNR and other typical indicators for measuring the performance of image encryption methods.

[1]  H. B. Kekre,et al.  Partial Image Scrambling Using Walsh Sequency in Sinusoidal Wavelet Transform Domain , 2016 .

[2]  Zhen Wu,et al.  An improved threshold multi-level image recovery scheme , 2018, J. Inf. Secur. Appl..

[3]  Ja-Chen Lin,et al.  Secret image sharing , 2002, Comput. Graph..

[4]  Musheer Ahmad,et al.  Cryptanalysis of Image Encryption Based on Permutation-Substitution Using Chaotic Map and Latin Square Image Cipher , 2014, FICTA.

[5]  Xiaonan Luo,et al.  Integrated chaotic systems for image encryption , 2018, Signal Process..

[6]  A. Kanso,et al.  A novel image encryption algorithm based on a 3D chaotic map , 2012 .

[7]  Ning Ma,et al.  Two secret sharing schemes based on Boolean operations , 2007, Pattern Recognit..

[8]  E. Solak,et al.  Cryptanalysis of a chaos-based image encryption algorithm , 2009 .

[9]  P. Grassberger,et al.  On the symbolic dynamics of the Henon map , 1989 .

[10]  Qing Zhou,et al.  A novel image encryption algorithm based on self-adaptive wave transmission , 2010, Signal Process..

[11]  Chin-Chen Chang,et al.  A novel image protection scheme using bit-plane compression and secret sharing , 2017 .

[12]  Kuang-Shyr Wu A secret image sharing scheme for light images , 2013, EURASIP J. Adv. Signal Process..

[13]  G. Ye A block image encryption algorithm based on wave transmission and chaotic systems , 2013, Nonlinear Dynamics.

[14]  Abderrahim Saaidi,et al.  A Novel Image Encryption Algorithm Based on the Two-Dimensional Logistic Map and the Latin Square Image Cipher , 2015 .

[15]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[16]  Qiang Zhang,et al.  Image Encryption Algorithm Based on Chaotic Modulation of Arnold Dual Scrambling and DNA Computing , 2011 .

[17]  Jui-Lin Lai,et al.  Image security system using recursive cellular automata substitution , 2007, Pattern Recognit..

[18]  J. Fridrich Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .

[19]  Karel Vlcek,et al.  Image Encryption In Wavelet Domain Based on Chaotic Maps , 2009, 2009 2nd International Congress on Image and Signal Processing.

[20]  Sos S. Agaian,et al.  Two Fibonacci P-code based image scrambling algorithms , 2008, Electronic Imaging.

[21]  Xiaofeng Liao,et al.  Cryptanalysis and enhancements of image encryption based on three-dimensional bit matrix permutation , 2018, Signal Process..

[22]  Guo-Qiang Han,et al.  The Application of Chaos and DWT in Image Scrambling , 2006, 2006 International Conference on Machine Learning and Cybernetics.

[23]  Ran-Zan Wang,et al.  Secret image sharing with smaller shadow images , 2006, Pattern Recognit. Lett..

[24]  Xing-yuan Wang,et al.  A chaotic image encryption algorithm based on perceptron model , 2010 .

[25]  Ching-Nung Yang,et al.  Constructions and properties of k out of n scalable secret image sharing , 2010 .

[26]  S. Li,et al.  Cryptographic requirements for chaotic secure communications , 2003, nlin/0311039.

[27]  Yong Zhang Cryptanalysis of an Image Encryption Algorithm Based on Chaotic Modulation of Arnold Dual Scrambling and DNA Computing , 2014 .

[28]  Olu Lafe Data compression and encryption using cellular automata transforms , 1997 .

[29]  Xiaonan Luo,et al.  A Parameter-Selection-Based Chaotic System , 2019, IEEE Transactions on Circuits and Systems II: Express Briefs.

[30]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[31]  Ching-Nung Yang,et al.  New extended visual cryptography schemes with clearer shadow images , 2014, Inf. Sci..

[32]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[33]  Hejiao Huang,et al.  2D Logistic-Sine-coupling map for image encryption , 2018, Signal Process..

[34]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[35]  Ziba Eslami,et al.  An authenticated image encryption scheme based on chaotic maps and memory cellular automata , 2013 .

[36]  Nikolaos G. Bourbakis,et al.  A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks , 2008, Signal Process. Image Commun..

[37]  Hsien-Chu Wu,et al.  Color Visual Cryptography Scheme Using Meaningful Shares , 2008, 2008 Eighth International Conference on Intelligent Systems Design and Applications.

[38]  Sos S. Agaian,et al.  Design of image cipher using latin squares , 2014, Inf. Sci..

[39]  Barry G. Blundell,et al.  On Alternative Approaches to 3D Image Perception: Monoscopic 3D Techniques , 2015 .

[40]  Rhouma Rhouma,et al.  Cryptanalysis of a new image encryption algorithm based on hyper-chaos , 2008 .

[41]  H. T. Panduranga,et al.  Image encryption based on permutation-substitution using chaotic map and Latin Square Image Cipher , 2014 .

[42]  Tao Xie,et al.  Breaking a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system , 2014 .