Treffer: A novel (n, n) multi-secret image sharing scheme harnessing RNA cryptography and 1-D group cellular automata.

Title:
A novel (n, n) multi-secret image sharing scheme harnessing RNA cryptography and 1-D group cellular automata.
Source:
Indonesian Journal of Electrical Engineering & Computer Science; Jul2025, Vol. 39 Issue 1, p700-709, 10p
Database:
Complementary Index

Weitere Informationen

In the modern landscape, securing digital media is crucial, as digital images are increasingly disseminated through unsecured channels. Therefore, image encryption is widely employed, transforming visual data into an unreadable format to enhance image security and prevent unauthorized access. This paper proposes an efficient (n, n) multi-secret image sharing (MSIS) scheme that leverages ribonucleic acid (RNA) cryptography and one-dimensional (1-D) group cellular automata (GCA) rules. The (n, n) MSIS scheme encrypts n images into n distinct shares, necessitating all n shares for decryption to accurately reconstruct the original n images. Initially, a key image is generated using RNA cryptography, harnessing the extensive sequence variability and inherent complexity of RNA. This secret key is then used to encrypt n images in the primary phase. In the secondary phase, pixel values are transformed through multiple processes, with randomness achieved by executing a key function derived from GCA, known for its reversible properties, computational efficiency, and robustness against cryptographic attacks. The proposed model, implemented in Python, is validated through experimental results, demonstrating its effectiveness in resisting a broad spectrum of attacks, including statistical, entropy, differential, and pixel parity analyses. These findings affirm the model's durability, security, an [ABSTRACT FROM AUTHOR]

Copyright of Indonesian Journal of Electrical Engineering & Computer Science is the property of Institute of Advanced Engineering & Science and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)