Security-enhanced cloud-based image secret sharing and authentication using POB number system
- PDF / 3,042,718 Bytes
- 24 Pages / 439.37 x 666.142 pts Page_size
- 27 Downloads / 187 Views
Security-enhanced cloud-based image secret sharing and authentication using POB number system Tzung-Her Chen 1
1
& Tzu-Ching Chang & Ting-Le Zhu
1
Received: 5 November 2019 / Revised: 22 July 2020 / Accepted: 28 July 2020 # Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract
Recently, the image secret sharing technique based on POB (Permutation Ordered Binary) number systems has drawn attention in academia. Thanks to Singh et al.’s pioneer in combining image confidentiality and authentication to form a cloud-based image cryptosystem using the POB number system. However, for image confidentiality and integrity, there are always two main concerns of a new image cryptosystem: the protection from unauthorized disclosure and the sensitivity of tampering. To claim confidentiality and integrity guaranty of secure image cryptosystems is meaningful only when the cryptanalysis is taken into consideration. In this article, Singh et al.’s scheme has undergone the scrutiny and potential security weaknesses found. First, the secret image may leak under chosen-plain-image attacks. Second, the partial secret key deducible under cipher/share-image-only attacks is shown unneglectable. Precisely, it is potentially problematic since the security of image authentication only relies on the secrecy of the parameter r of POB number systems, but the parameter is also learned to know by a heuristic method. The main weak design has been shown by means of introducing theoretical analyses and conducting some counter experiments. As a result, in this study we have focused on proposing a security-enhanced POB-based image secret sharing scheme with five primary advantages: (1) high security to confidentiality, (2) lossless reconstructed secret image, (3) high security to integrity, (4) high detection accuracy, and (5) low time complexity. The experimental results and the further analysis demonstrate that the simple and secure improvement does work. Keywords Secret sharing . Image authentication . POB number system . False negative
* Tzung-Her Chen [email protected]
1
National Chiayi University, Chiayi, Taiwan
Multimedia Tools and Applications
1 Introduction With increasing service availability and reducing users’ burden in managing data, outsourcing data to cloud servers [8, 12, 13] have inevitably brought in new security concerns such as confidentiality, integrity, etc., since the servers may be honest-but-curious or even malicious. In such a way, encryption and integrity have drawn more and more attention in academia and industry. It is worthwhile to note that security is always the main concern for a new cryptosystem. A well-known multimedia encryption scheme presents a promising direction pioneered by Wu and Kuo [15] to combine encryption with entropy coding using multiple Huffman table (MHT). However, that scheme is cryptanalyzed by Zhou et al. [16] and Jakimoski and Subbalakshmi [5]. Further, Jakimoski and Subbalakshmi analyzed the other two methods for multimedia encryption: arithmetic coding with
Data Loading...