{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:49:24Z","timestamp":1762004964836},"reference-count":31,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,1,1]]},"abstract":"<p>A novel random grid and reversible watermarking based verifiable secret sharing scheme for outsourcing image in cloud is proposed in the paper. In the proposed scheme, data owner firstly embeds the hash value of the secret image into the secret image itself using reversible watermarking algorithm; then, watermarked image is divided into $n$ sub image. Secondly, the hash of n sub image is calculated, and then the hash value is transformed into the initial value of hyper-chaos, thus n random grids are generated by different hyper-chaos. Lastly, after expanding the sub-image to the same size with the original secret image, it is performer XOR operation with the corresponding random grid, this will accordingly produce $n$ sharing secret. In order to securely outsource the image in the cloud, the generated shares are issued to the $n$ different cloud server. For authorized user, (s)he can get shares from different cloud server, and then can recover the original secret image through a series of decryption operations and extraction of reversible watermarking. The proposed scheme can losslessly restore the original secret image, and have the double verification ability, that is to say, it can verify whether the anyone of the sharing is modified, and it can also verify whether the original secret image is completely reconstructed. Some analysis and comparisons are given to show the security and effectiveness of proposed scheme.<\/p>","DOI":"10.4018\/ijdcf.2018010103","type":"journal-article","created":{"date-parts":[[2017,11,9]],"date-time":"2017-11-09T16:28:50Z","timestamp":1510244930000},"page":"24-39","source":"Crossref","is-referenced-by-count":6,"title":["Random Grid and Reversible Watermarking-Based On Verifiable Secret Sharing for Outsourcing Images in Cloud"],"prefix":"10.4018","volume":"10","author":[{"given":"Hang","family":"Gao","sequence":"first","affiliation":[{"name":"College of Computer and Control Engineering, Nankai University, Tianjin, China"}]},{"given":"Mengting","family":"Hu","sequence":"additional","affiliation":[{"name":"College of Computer and Control Engineering, Nankai University, Tianjin, China"}]},{"given":"Tiegang","family":"Gao","sequence":"additional","affiliation":[{"name":"College of Software, Nankai University, Tianjin, China"}]},{"given":"Renhong","family":"Cheng","sequence":"additional","affiliation":[{"name":"College of Computer and Control Engineering, Nankai University, Tianjin, China"}]}],"member":"2432","reference":[{"key":"IJDCF.2018010103-0","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2014.06.012"},{"key":"IJDCF.2018010103-1","doi-asserted-by":"crossref","unstructured":"Agrawal, D., El Abbadi, A., Emekci, F., Metwally, A., & Wang, S. (2011). Secure data management service on cloud computing infrastructures. In Proceedings of Service and Application Design Challenges in the Cloud (pp. 57-80).","DOI":"10.1007\/978-3-642-19294-4_3"},{"key":"IJDCF.2018010103-2","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2013.04.018"},{"key":"IJDCF.2018010103-3","doi-asserted-by":"crossref","unstructured":"Niu, S., Tu, S., & Huang, Y. (2015). An effective and secure access control system scheme in the cloud. Chinese Journal of Electronics, 24(5), 524\u2013528.","DOI":"10.1049\/cje.2015.07.015"},{"key":"IJDCF.2018010103-4","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2013.05.014"},{"key":"IJDCF.2018010103-5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2145372"},{"key":"IJDCF.2018010103-6","doi-asserted-by":"crossref","unstructured":"Dautrich, J. L., & Ravishankar, C. V. (2012). Security limitations of using secret sharing for data outsourcing. In Proceedings of the 26th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, Paris, France (pp. 145-160).","DOI":"10.1007\/978-3-642-31540-4_12"},{"key":"IJDCF.2018010103-7","unstructured":"Federal Information Processing Standards. (2002, August). Announcing the Secure Hash Standard. U.S. DoC\/NIST."},{"key":"IJDCF.2018010103-8","doi-asserted-by":"publisher","DOI":"10.1142\/S0129183106008625"},{"key":"IJDCF.2018010103-9","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2012.07.013"},{"key":"IJDCF.2018010103-10","first-page":"54","article-title":"Secure data outsourcing based on threshold secret sharing; towards a more practical solution","author":"M. A.Hadavi","year":"2010","journal-title":"Proceedings of the 36th International Conference on Very Large Data Bases"},{"key":"IJDCF.2018010103-11","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-015-0277-x"},{"key":"IJDCF.2018010103-12","doi-asserted-by":"publisher","DOI":"10.4018\/ijghpc.2013100107"},{"key":"IJDCF.2018010103-13","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-016-0408-y"},{"key":"IJDCF.2018010103-14","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2015.03.003"},{"key":"IJDCF.2018010103-15","doi-asserted-by":"publisher","DOI":"10.1364\/OL.12.000377"},{"issue":"4","key":"IJDCF.2018010103-16","first-page":"286","article-title":"Outsourcing decryption of multi-authority ABE cipher texts","volume":"16","author":"K.Li","year":"2014","journal-title":"International Journal of Network Security"},{"key":"IJDCF.2018010103-17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.12.046"},{"issue":"4","key":"IJDCF.2018010103-18","first-page":"617","article-title":"An Integratable veriable secret sharing mechanism","volume":"18","author":"Y.Liu","year":"2016","journal-title":"International Journal of Network Security"},{"issue":"8","key":"IJDCF.2018010103-19","first-page":"2708","article-title":"A fast and secure scheme for data outsourcing in the cloud","volume":"8","author":"Y.Liu","year":"2014","journal-title":"Transactions on Internet and Information Systems (Seoul)"},{"key":"IJDCF.2018010103-20","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0053419"},{"key":"IJDCF.2018010103-21","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2006.869964"},{"key":"IJDCF.2018010103-22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2015.05.006"},{"key":"IJDCF.2018010103-23","first-page":"44","author":"D. X.Song","year":"2000","journal-title":"Practical techniques for searches on encrypted data"},{"key":"IJDCF.2018010103-24","doi-asserted-by":"publisher","DOI":"10.1179\/174313107X214330"},{"key":"IJDCF.2018010103-25","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.64.056235"},{"key":"IJDCF.2018010103-26","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2011.04.004"},{"key":"IJDCF.2018010103-27","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-014-1235-2"},{"key":"IJDCF.2018010103-28","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2499791"},{"key":"IJDCF.2018010103-29","doi-asserted-by":"publisher","DOI":"10.1002\/sec.795"},{"key":"IJDCF.2018010103-30","first-page":"1","article-title":"Efficient and secure encrypted image search in mobile cloud computing.","volume":"4","author":"Q.Zou","year":"2016","journal-title":"Soft Computing"}],"container-title":["International Journal of Digital Crime and Forensics"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=193018","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T20:51:41Z","timestamp":1651870301000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJDCF.2018010103"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2018,1,1]]},"references-count":31,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"URL":"https:\/\/doi.org\/10.4018\/ijdcf.2018010103","relation":{},"ISSN":["1941-6210","1941-6229"],"issn-type":[{"value":"1941-6210","type":"print"},{"value":"1941-6229","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1,1]]}}}