A Verifiable Secret Image Sharing Scheme Based on Compressive Sensing

被引:0
|
作者
LI Xinyan [1 ,2 ]
XIAO Di [2 ]
MOU Huajian [3 ]
ZHANG Rui [2 ]
机构
[1] School of Mathematics and Statistics,Yangtze Normal University
[2] College of Computer Science,Chongqing University
[3] College of Computer Engineering,Yangtze Normal University
基金
中央高校基本科研业务费专项资金资助; 中国国家自然科学基金;
关键词
compressive sensing; secret sharing; measurement matrix; image hashing;
D O I
暂无
中图分类号
TP391.41 [];
学科分类号
080203 ;
摘要
This paper proposes a verifiable secret image sharing scheme based on compressive sensing, secret sharing, and image hashing. In this scheme, Toeplitz matrix generated by two chaotic maps is employed as measurement matrix. With the help of Shamir threshold scheme and image hashing, the receivers can obtain the stored values and the hash value of image. In the verifying stage and restoring stage, there must be at least t legal receivers to get the effective information. By comparing the hash value of the restored image with the hash value of original image, the scheme can effectively prevent the attacker from tampering or forging the shared images. Experimental results show that the proposed scheme has good recovery performance, can effectively reduce space, and is suitable for real-time transmission, storage, and verification.
引用
收藏
页码:219 / 224
页数:6
相关论文
共 50 条
  • [1] A Secure Verifiable Scheme for Secret Image Sharing
    Rose, Angel A.
    Thampi, Sabu M.
    SECOND INTERNATIONAL SYMPOSIUM ON COMPUTER VISION AND THE INTERNET (VISIONNET'15), 2015, 58 : 140 - 150
  • [2] Verifiable visually meaningful image encryption algorithm based on compressive sensing and (t, n)-threshold secret sharing
    Yang, Yu-Guang
    Wang, Tao
    Zhou, Yi-Hua
    Shi, Wei-Min
    Jiang, Dong-Hua
    Liao, Xin
    PHYSICA SCRIPTA, 2024, 99 (02)
  • [3] Verifiable Changeable Threshold Secret Image Sharing Scheme Based on LWE Problem
    Dehkordi, Massoud Hadian
    Mashhadi, Samaneh
    Farahi, Seyed Taghi
    Noorallahzadeh, Mohammad Hossein
    WIRELESS PERSONAL COMMUNICATIONS, 2024, 137 (02) : 1099 - 1118
  • [4] A verifiable multi-secret image sharing scheme based on DNA encryption
    Chattopadhyay A.K.
    Saha S.
    Nag A.
    Singh J.P.
    Multimedia Tools and Applications, 2025, 84 (4) : 1967 - 1983
  • [5] A new approach of Secret Image Sharing using Verifiable Scheme
    Rao, Jyoti
    Venny, Priya
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 1134 - 1139
  • [6] A verifiable variable threshold visual image secret sharing scheme
    Yu-Guang Yang
    Wen Cheng
    Guang-Bao Xu
    Dong-Huan Jiang
    Yi-Hua Zhou
    Wei-Min Shi
    Dong-Hua Jiang
    Multimedia Systems, 2025, 31 (3)
  • [7] A verifiable threshold secret sharing scheme based on lattices
    Rajabi, Bahman
    Eslami, Ziba
    INFORMATION SCIENCES, 2019, 501 : 655 - 661
  • [8] A New Secret Image Sharing Scheme Based on Compressed Sensing
    Yang, Fuqiang
    Dang, Na
    Zhang, Junxing
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA ANALYSIS (ICCCBDA 2017), 2017, : 321 - 327
  • [9] A new (k, n) verifiable secret image sharing scheme (VSISS)
    Nag, Amitava
    Biswas, Sushanta
    Sarkar, Debasree
    Sarkar, Partha Pratim
    EGYPTIAN INFORMATICS JOURNAL, 2014, 15 (03) : 201 - 209
  • [10] A verifiable rational secret sharing scheme based on bilinear pairing
    Zhang, E. (zhangenzdrj@163.com), 1600, Chinese Institute of Electronics (40):