TY - JOUR
T1 - Modular-based secret image sharing in Internet of Things: A global progressive-enabled approach
AU - Zhang, Lina
AU - Zheng, Xiangqin
AU - Yu, Keping
AU - Li, Wenjuan
AU - Wang, Tao
AU - Dang, Xuan
AU - Yang, Bo
N1 - Funding Information:
“Industry‐University‐Reserch” Innovation Fund of China Ministry of Education, 2019J02008; Fundamental Research Funds for the Central Universities , No. GK201903089, GK202007031; GK201903089, GK202007031; “Industry‐University‐Research” Innovation Fund of China Ministry of Education, 2019J02008; Natural Science Basic Research Plan in Shaanxi Province of China, 2019JM‐552; Japan Society for the Promotion of Science (JSPS) Grants‐in‐Aid for Scientific Research (KAKENHI), JP18K18044; National Natural Science Foundation of China, 61772326; National Key R&D Program of China, 2017YFB0802000 Funding information
Funding Information:
This work is supported by National Key R&D Program of China (no. 2017YFB0802000), the National Natural Science Foundation of China (61772326), the Japan Society for the Promotion of Science (JSPS) Grants‐in‐Aid for Scientific Research (KAKENHI) under Grant JP18K18044, the Fundamental Research Funds for the Central Universities (No. GK201903089, GK202007031). It is also supported by the Natural Science Basic Research Plan in Shaanxi Province of China (2019JM‐552) and the “Industry‐University‐Research” Innovation Fund of China Ministry of Education (2019J02008).
Publisher Copyright:
© 2020 John Wiley & Sons Ltd
PY - 2020
Y1 - 2020
N2 - Due to the continuous development and progress of information technology, the Internet has also entered the era of big data based on the Internet of Things (IoT). How to protect the security of data stored and transmitted in the IoT is one of the urgent problems to be solved. This article focuses on the security issues of storage and transmission of image data in the IoT. Secret image sharing (SIS) is a kind of image protection mechanism by dividing an image into n shares, and different shares are given to different participants separately for preservation. Only when the number of shares reaches the threshold can the original image be recovered. From the perspective of image reconstruction mode, there are two types of SIS schemes: one is the traditional (k, n) threshold scheme, which provides an all-or-nothing reconstruction mode, the other is the progressive scheme, which can gradually restore the original image. In this article, a novel (k, k2) progressive secret image sharing based on modular operations is proposed, this method can divide the important images stored in the IoT into many parts and then transmit them to people in different places. It takes the whole as a unit in terms of the progressive recovery form. When the share reaches the threshold, certain blocks of the original image can be seen. As the share increases, the image will be clearer. When all shares participate in the reconstruction together, the original image can be restored without loss. Compared with other schemes, our scheme has the same smoothness, shadow size and satisfies the security, and is fine-grained progressive.
AB - Due to the continuous development and progress of information technology, the Internet has also entered the era of big data based on the Internet of Things (IoT). How to protect the security of data stored and transmitted in the IoT is one of the urgent problems to be solved. This article focuses on the security issues of storage and transmission of image data in the IoT. Secret image sharing (SIS) is a kind of image protection mechanism by dividing an image into n shares, and different shares are given to different participants separately for preservation. Only when the number of shares reaches the threshold can the original image be recovered. From the perspective of image reconstruction mode, there are two types of SIS schemes: one is the traditional (k, n) threshold scheme, which provides an all-or-nothing reconstruction mode, the other is the progressive scheme, which can gradually restore the original image. In this article, a novel (k, k2) progressive secret image sharing based on modular operations is proposed, this method can divide the important images stored in the IoT into many parts and then transmit them to people in different places. It takes the whole as a unit in terms of the progressive recovery form. When the share reaches the threshold, certain blocks of the original image can be seen. As the share increases, the image will be clearer. When all shares participate in the reconstruction together, the original image can be restored without loss. Compared with other schemes, our scheme has the same smoothness, shadow size and satisfies the security, and is fine-grained progressive.
KW - fine-grained PSIS
KW - IoT
KW - modulo operation
UR - http://www.scopus.com/inward/record.url?scp=85091217684&partnerID=8YFLogxK
U2 - 10.1002/cpe.6000
DO - 10.1002/cpe.6000
M3 - Journal article
AN - SCOPUS:85091217684
SN - 1532-0626
JO - Concurrency Computation
JF - Concurrency Computation
ER -