A New Secret Sharing Scheme for Images Based on Additive 2-Dimensional Cellular Automata

A new secret color image sharing scheme based on two-dimensional memory cellular automata, is proposed. Such protocol is of a (n,n)-threshold scheme where the secret image to be shared is considered as one of the initial configurations of the cellular automata. The original idea is to study how a reversible model of computation permits to compute the shares and then using the reverse computation in order to recover the original image. The scheme is proved to be perfect and ideal, and resistant to the most important attacks such as statistical attacks.

[1]  Willi Meier,et al.  Analysis of Pseudo Random Sequence Generated by Cellular Automata , 1991, EUROCRYPT.

[2]  Ángel Martín del Rey,et al.  Wolfram cellular auto mata and their cryptographic use as pseudorandom bit generators , 2003 .

[3]  Ramón Alonso-Sanz,et al.  Reversible cellular automata with memory: two-dimensional patterns from a single site seed , 2003 .

[4]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice,Second Edition , 2002 .

[5]  Ángel Martín del Rey,et al.  Encryption of Images with 2-dimensional Cellular Automata , 2002 .

[6]  N. Margolus,et al.  Invertible cellular automata: a review , 1991 .

[7]  Alfredo De Santis,et al.  Advances in Cryptology — EUROCRYPT'94 , 1994, Lecture Notes in Computer Science.

[8]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[9]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[10]  S. Wolfram Random sequence generation by cellular automata , 1986 .

[11]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[12]  Douglas R. Stinson,et al.  An explication of secret sharing schemes , 1992, Des. Codes Cryptogr..

[13]  Marco Tomassini,et al.  Cryptography with cellular automata , 2001, Appl. Soft Comput..

[14]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[15]  Donald W. Davies,et al.  Advances in Cryptology — EUROCRYPT ’91 , 2001, Lecture Notes in Computer Science.

[16]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[17]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[18]  Parimal Pal Chaudhuri,et al.  Theory and Applications of Cellular Automata in Cryptography , 1994, IEEE Trans. Computers.

[19]  Lakhmi C. Jain,et al.  Knowledge-Based Intelligent Information and Engineering Systems , 2004, Lecture Notes in Computer Science.

[20]  Chin-Chen Chang,et al.  An image intellectual property protection scheme for gray-level images using visual secret sharing strategy , 2002, Pattern Recognit. Lett..

[21]  Gonzalo Álvarez,et al.  Graphic Cryptography with Pseudorandom Bit Generators and Cellular Automata , 2003, KES.

[22]  Chin-Chen Chang,et al.  Sharing Secret Omages using Shadow Codebooks , 1998, Inf. Sci..

[23]  A. Beimel,et al.  Lower bounds for monotone span programs , 2005, computational complexity.

[24]  Ja-Chen Lin,et al.  Secret image sharing , 2002, Comput. Graph..

[25]  Chin-Chen Chang,et al.  Sharing multiple secrets in digital images , 2002, J. Syst. Softw..

[26]  Jon C. Muzio,et al.  An Explicit Similarity Transform between Cellular Automata and LFSR Matrices , 1998 .