Author
Listed:
- Yongqiang Yu
(College of Electronic Engineering, National University of Defense Technology, Hefei 230037, China
Anhui Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, Hefei 230037, China)
- Xuehu Yan
(College of Electronic Engineering, National University of Defense Technology, Hefei 230037, China
Anhui Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, Hefei 230037, China)
- Shudong Wang
(College of Electronic Engineering, National University of Defense Technology, Hefei 230037, China
Anhui Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, Hefei 230037, China)
- Xianhui Wang
(College of Electronic Engineering, National University of Defense Technology, Hefei 230037, China
Anhui Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, Hefei 230037, China)
- Huan Lu
(College of Electronic Engineering, National University of Defense Technology, Hefei 230037, China
Anhui Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, Hefei 230037, China)
Abstract
In recent years, the amount of data has increased explosively, which has spawned the large-scale development of cloud storage. Increasingly, individuals and enterprises store images in cloud space. The storage security of the cloud is generally guaranteed by encryption, but this can no longer meet the needs of image management and protection. In order to realize the management and loss tolerance of images, this paper proposes a thumbnail secret image sharing method. The proposed scheme combines the advantages of thumbnail-preserving encryption (TPE) and secret image sharing (SIS) with different meaningful shadows. Thumbnails can realize the visual management of stored images, and secret image sharing can realize the perfect security of stored images. The proposed scheme realizes the confidentiality, integrity, and availability of images, which are three elements of information security. Compared with TPE, our scheme not only realizes the visual management of images but also achieves loss tolerance and perfect security. Compared with SIS with different meaningful shadows, our scheme will greatly improve the sharing efficiency and reduce the consumption of computing resources. In this paper, the theoretical analysis and security proof of the proposed scheme are presented. In addition, we also conduct sufficient experiments and comparative explanations.
Suggested Citation
Yongqiang Yu & Xuehu Yan & Shudong Wang & Xianhui Wang & Huan Lu, 2022.
"Thumbnail Secret Image Sharing in Cloud Storage,"
Mathematics, MDPI, vol. 10(17), pages 1-16, August.
Handle:
RePEc:gam:jmathe:v:10:y:2022:i:17:p:3076-:d:898028
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jmathe:v:10:y:2022:i:17:p:3076-:d:898028. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.