A novel non-expansion visual secret sharing scheme for binary image

被引:0
作者
Abbas T. [1 ]
Beiji Z. [1 ]
机构
[1] School of Information Science and Engineering, Central South University
关键词
Pseudo random number generator(PRNG); Visual cryptography; Visual secret sharing(VSS);
D O I
10.4156/jdcta.vol4.issue6.13
中图分类号
学科分类号
摘要
In visual cryptography, the secret can be any written text, graphical representation, or picture. This technique, some time called visual secret sharing (VSS), allows visual information to be encrypted in such a way that the decryption can be performed by the human visual system. In this paper, a novel approach to VSS based on the use of pseudo random number generator (PRNG) that has very long periods to ensure unrepeated pattern in addition to its effective approach. It is a secure approach to prevent the secret image from being stolen, lost or corrupted. In comparison with other image secret sharing methods the main advantage of this approach are its strong protection of the secret image and effective mechanism for secret image sharing that is not found in existing secret image sharing methods. Experimental results proved the feasibility of the proposed approach are also included.
引用
收藏
页码:106 / 114
相关论文
共 13 条
[1]  
Beinel A., Livne N., Paclro C., Theory of cryptography: Ideal secret sharing, In Proceeding of the Third Theory of Cryptography Conference, 514, pp. 13-21, (2006)
[2]  
Chen Y.F., Chan Y.K., Huang C.C., Tsal M.H., Chu Y.P., A multiple-level visual secret-sharing scheme without image size expansion, Journal of Information Sciences, Science Direct, 177, 21, pp. 4696-4710, (2007)
[3]  
Rukhin A., Et al., A Statistical Test Suite for Random and Pseudo random Number Generators for Cryptographic Applications, National Institute of Standards and Technology, (2001)
[4]  
Li B., A reliable (k, n) Image Secret Sharing Scheme, In Proceeding of the 2nd IEEE International Conference On Autonomic and Secure Computing, pp. 15-24, (2006)
[5]  
Lukac R., Plataniotis K.N., Level based secret sharing for image encryption, Journal of Pattern Recognition,Elsevier, 38, 5, pp. 767-772, (2005)
[6]  
Naor M., Shamir A., Visual cryptography, In Proceedings of Advances In Cryptography 94, LNCS, 950, pp. 1-12, (1995)
[7]  
Fang W.-P., Visual cryptography in reversible style, In Proceeding of the Third IEEE International Conference On Hiding and Multimedia Signal Processing, pp. 11-28, (2007)
[8]  
Lin C.-C., Tsai W.-H., Secret image sharing with steganography and authentication, Journal of System and Software,Elsevier, 73, pp. 405-414, (2004)
[9]  
Fang W.P., Non -expansion visual secret sharing in reversible style, IJCSNS International Journal of Computer Science and Network Security, 2, (2009)
[10]  
Yu-Shan W., Thien C.-C., Lin J.-C., Sharing and Hiding Secret Images with Size Constraint, Journal of Pattern Recognition, Elsevier, 37, pp. 1377-1385, (2004)