Essential secret image sharing scheme with different importance of shadows

被引:78
作者
Li, Peng [1 ]
Yang, Ching-Nung [2 ]
Wu, Chih-Cheng [2 ]
Kong, Qian [1 ]
Ma, Yanpeng [1 ]
机构
[1] North China Elect Power Univ, Dept Math & Phys, Baoding 071003, Hebei, Peoples R China
[2] Natl Dong Hwa Univ, Dept CSIE, Taipei, Taiwan
关键词
Secret sharing; Secret image sharing; Essential shadow image; Lagrange's interpolation; Information hiding; Visual cryptography; Visual secret sharing; Image processing; STEGANOGRAPHY; AUTHENTICATION; IMPROVEMENTS;
D O I
10.1016/j.jvcir.2013.07.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In (k, n) secret image sharing (SIS), a scheme encrypts a secret image into n shadow images. Any k or more shadow images can be collaborated together to reveal the secret image. Most of the previous SIS schemes don't distinguish the importance of shadows. However, in some application environments, some participants are accorded special privileges due to their status or importance. Thus, some shadows may be more important than others. In this paper, we consider the (t, s, k, n) essential SIS (ESIS) scheme. All n shadows are classified into s essential shadows and (n-s) non-essential shadows. When reconstructing the secret image, the (t, s, k, n)-ESIS scheme needs k shadows, which should include at least t essential shadows. (C) 2013 Elsevier Inc. All rights reserved.
引用
收藏
页码:1106 / 1114
页数:9
相关论文
共 19 条
[1]   Sharing secrets in stego images with authentication [J].
Chang, Chin-Chen ;
Hsieh, Yi-Pei ;
Lin, Chia-Hsuan .
PATTERN RECOGNITION, 2008, 41 (10) :3130-3137
[2]   Weighted modulated secret image sharing method [J].
Chen, Chien-Chang ;
Chen, Chaur-Chin ;
Lin, Yun-Cheng .
JOURNAL OF ELECTRONIC IMAGING, 2009, 18 (04)
[3]  
Elsheh E, 2010, LECT NOTES COMPUT SC, V6419, P169
[4]   Improvements of a two-in-one image secret sharing scheme based on gray mixing model [J].
Li, Peng ;
Ma, Pei-Jun ;
Su, Xiao-Hong ;
Yang, Ching-Nung .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2012, 23 (03) :441-453
[5]   Secret image sharing with steganography and authentication [J].
Lin, CC ;
Tsai, WH .
JOURNAL OF SYSTEMS AND SOFTWARE, 2004, 73 (03) :405-414
[6]   VCPSS: A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches [J].
Lin, Sian-Jheng ;
Lin, Ja-Chen .
PATTERN RECOGNITION, 2007, 40 (12) :3652-3666
[7]   Fast-weighted secret image sharing [J].
Lin, Sian-Jheng ;
Chen, Lee Shu-Teng ;
Lin, Ja-Chen .
OPTICAL ENGINEERING, 2009, 48 (07)
[8]  
Rey A.M., 2008, LNCS, V5197, P635
[9]   HOW TO SHARE A SECRET [J].
SHAMIR, A .
COMMUNICATIONS OF THE ACM, 1979, 22 (11) :612-613
[10]  
Shyu SJ, 2009, LECT NOTES COMPUT SC, V5414, P988, DOI 10.1007/978-3-540-92957-4_86