کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
1537096 996580 2011 18 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Application of homomorphism to secure image sharing
موضوعات مرتبط
مهندسی و علوم پایه مهندسی مواد مواد الکترونیکی، نوری و مغناطیسی
پیش نمایش صفحه اول مقاله
Application of homomorphism to secure image sharing
چکیده انگلیسی

In this paper, we present a new approach for sharing images between l players by exploiting the additive and multiplicative homomorphic properties of two well-known public key cryptosystems, i.e. RSA and Paillier. Contrary to the traditional schemes, the proposed approach employs secret sharing in a way that limits the influence of the dealer over the protocol and allows each player to participate with the help of his key-image. With the proposed approach, during the encryption step, each player encrypts his own key-image using the dealer's public key. The dealer encrypts the secret-to-be-shared image with the same public key and then, the l encrypted key-images plus the encrypted to-be shared image are multiplied homomorphically to get another encrypted image. After this step, the dealer can safely get a scrambled image which corresponds to the addition or multiplication of the l + 1 original images (l key-images plus the secret image) because of the additive homomorphic property of the Paillier algorithm or multiplicative homomorphic property of the RSA algorithm. When the l players want to extract the secret image, they do not need to use keys and the dealer has no role. Indeed, with our approach, to extract the secret image, the l players need only to subtract their own key-image with no specific order from the scrambled image. Thus, the proposed approach provides an opportunity to use operators like multiplication on encrypted images for the development of a secure privacy preserving protocol in the image domain. We show that it is still possible to extract a visible version of the secret image with only l-1 key-images (when one key-image is missing) or when the l key-images used for the extraction are different from the l original key-images due to a lossy compression for example. Experimental results and security analysis verify and prove that the proposed approach is secure from cryptographic viewpoint.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Optics Communications - Volume 284, Issue 19, 1 September 2011, Pages 4412–4429
نویسندگان
, , , ,