Secret Image Sharing Over Cloud Using One-Dimensional Chaotic Map

Massive computing on cloud infrastructure had achieved remarkable consideration and popularity in recent years. However, security and privacy issues are also emerging as cloud infrastructures are deployed and maintained by third parties. In this paper, we

  • PDF / 911,164 Bytes
  • 11 Pages / 439.37 x 666.142 pts Page_size
  • 91 Downloads / 199 Views

DOWNLOAD

REPORT


1 Introduction Cloud computing has consistently enabled the infrastructure providers to move very rapidly toward new facilities. Such movement has attracted the world toward “pay as you go” model defined by cloud service providers. Almost every task that a user wants to perform is now available over cloud. Such an advancement in cloud computing has made organizations and professionals to migrate their business models and tasks over cloud. However, such swift growth of data toward cloud computing has been raising security and privacy concerns. The users can send their data over cloud for processing and storage without any difficulty at their end, but how secure is the data to be stored over cloud? Such questions are raising a major difficulty in the realization of cloud computing and it is needed to be considered solemnly. Cryptography is the science of converting plain text to another form which is hard to understand [1]. Communication of encrypted messages such that only willful recipient can decrypt is the main objective of cryptography. Cryptography involves communicating parties, each with a secret key shared between them. Complex computations are used to attain encryption in such a manner that only the anticipated recipient can decrypt the data. Data can be anything and especially in today’s world; most of the data is shared in the form of digital images. Hence, when storing the images over untrusted third parties, there is a need arised to secure them from unauthorized access and modifications. One way to secure digital images is image encryption. The secret image is encoded using complex mathematical formulations such

P. Sharma (B) School of Information Technology, Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal, India e-mail: [email protected] V. Sharma University Institute of Technology, Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal, India e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2019 R. K. Shukla et al. (eds.), Data, Engineering and Applications, https://doi.org/10.1007/978-981-13-6351-1_2

13

14

P. Sharma and V. Sharma

that a distorted random-like structure can be obtained in the form of an encrypted image. On the other hand, visual cryptography is emerging as a new way to secure the images where shares of the plain secret image are generated. Secret image is recovered when all the shares are stacked together. Both image encryption and visual cryptography sound quite the same, but they are different in the sense they realize security to the image. Partitioning of the plain secret image into multiple shares such that no image information is revealed from any of the shares is the primary objective of visual cryptography [2]. The shares can then be transmitted through any untrusted medium. At the receiving side, all the shares are stacked and plain secret image is reconstructed. Introduced by Naor and Shamir [3], visual cryptography was proposed as an easy and feasible approach for secretly sharing the images without needing any difficult cryptographic operations. The