Essential secret image sharing scheme with different importance of shadows

被引:77
|
作者
Li, Peng [1 ]
Yang, Ching-Nung [2 ]
Wu, Chih-Cheng [2 ]
Kong, Qian [1 ]
Ma, Yanpeng [1 ]
机构
[1] North China Elect Power Univ, Dept Math & Phys, Baoding 071003, Hebei, Peoples R China
[2] Natl Dong Hwa Univ, Dept CSIE, Taipei, Taiwan
关键词
Secret sharing; Secret image sharing; Essential shadow image; Lagrange's interpolation; Information hiding; Visual cryptography; Visual secret sharing; Image processing; STEGANOGRAPHY; AUTHENTICATION; IMPROVEMENTS;
D O I
10.1016/j.jvcir.2013.07.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In (k, n) secret image sharing (SIS), a scheme encrypts a secret image into n shadow images. Any k or more shadow images can be collaborated together to reveal the secret image. Most of the previous SIS schemes don't distinguish the importance of shadows. However, in some application environments, some participants are accorded special privileges due to their status or importance. Thus, some shadows may be more important than others. In this paper, we consider the (t, s, k, n) essential SIS (ESIS) scheme. All n shadows are classified into s essential shadows and (n-s) non-essential shadows. When reconstructing the secret image, the (t, s, k, n)-ESIS scheme needs k shadows, which should include at least t essential shadows. (C) 2013 Elsevier Inc. All rights reserved.
引用
收藏
页码:1106 / 1114
页数:9
相关论文
共 50 条
  • [1] Essential secret image sharing scheme with the same size of shadows
    Li, Peng
    Yang, Ching-Nung
    Zhou, Zhili
    DIGITAL SIGNAL PROCESSING, 2016, 50 : 51 - 60
  • [2] Scalable secret image sharing scheme with essential shadows
    Liu, Yanxiao
    Yang, Chingnung
    SIGNAL PROCESSING-IMAGE COMMUNICATION, 2017, 58 : 49 - 55
  • [4] A construction method of (t, k, n)-essential secret image sharing scheme
    Li, Peng
    Liu, Zuquan
    Yang, Ching-Nung
    SIGNAL PROCESSING-IMAGE COMMUNICATION, 2018, 65 : 210 - 220
  • [5] Essential secret image sharing with increasable shadows
    Chen, Shang-Kuan
    OPTICAL ENGINEERING, 2016, 55 (01)
  • [6] Progressive secret image sharing scheme using meaningful shadows
    Wang, Zhi-Hui
    Di, Ya-Feng
    Li, Jianjun
    Chang, Chin-Chen
    Liu, Hui
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4075 - 4088
  • [7] A Linear Algebraic Threshold Essential Secret Image Sharing Scheme
    Ghebleh, Mohammad
    Kanso, Ali
    Alazemi, Abdullah
    MATHEMATICS, 2022, 10 (05)
  • [8] Essential Secret Image Sharing Scheme
    Chen, Chien-chang
    PROCEEDINGS OF 2010 CROSS-STRAIT CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY, 2010, : 471 - 474
  • [9] Meaningful secret image sharing resist to typical image processing of shadows
    Jiang, Yue
    Yan, Xuehu
    Qi, Jianqing
    Li, Longlong
    Liu, Yiming
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (11) : 16097 - 16115
  • [10] Renewal of secret and shadows in secret image sharing
    Yu, Yongqiang
    Yan, Xuehu
    Li, Longlong
    Wang, Jiayu
    IET INFORMATION SECURITY, 2022, 16 (06) : 432 - 441