Essential secret image sharing scheme with different importance of shadows

被引:77
|
作者
Li, Peng [1 ]
Yang, Ching-Nung [2 ]
Wu, Chih-Cheng [2 ]
Kong, Qian [1 ]
Ma, Yanpeng [1 ]
机构
[1] North China Elect Power Univ, Dept Math & Phys, Baoding 071003, Hebei, Peoples R China
[2] Natl Dong Hwa Univ, Dept CSIE, Taipei, Taiwan
关键词
Secret sharing; Secret image sharing; Essential shadow image; Lagrange's interpolation; Information hiding; Visual cryptography; Visual secret sharing; Image processing; STEGANOGRAPHY; AUTHENTICATION; IMPROVEMENTS;
D O I
10.1016/j.jvcir.2013.07.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In (k, n) secret image sharing (SIS), a scheme encrypts a secret image into n shadow images. Any k or more shadow images can be collaborated together to reveal the secret image. Most of the previous SIS schemes don't distinguish the importance of shadows. However, in some application environments, some participants are accorded special privileges due to their status or importance. Thus, some shadows may be more important than others. In this paper, we consider the (t, s, k, n) essential SIS (ESIS) scheme. All n shadows are classified into s essential shadows and (n-s) non-essential shadows. When reconstructing the secret image, the (t, s, k, n)-ESIS scheme needs k shadows, which should include at least t essential shadows. (C) 2013 Elsevier Inc. All rights reserved.
引用
收藏
页码:1106 / 1114
页数:9
相关论文
共 50 条
  • [31] A reversible and lossless secret image sharing scheme with authentication for color
    Li, Wendan
    Peng, Changgen
    Tan, Weijie
    Xu, Yi
    Niu, Kun
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2023, 35 (10)
  • [32] Fake and dishonest participant location scheme in secret image sharing
    Liu, Jingju
    Sun, Lei
    Liu, Jinrui
    Yan, Xuehu
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2021, 18 (03) : 2473 - 2495
  • [33] A novel multiple-level secret image sharing scheme
    Liu, Yi-Ning
    Zhong, Qi
    Xie, Ming
    Chen, Zu-Bin
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (05) : 6017 - 6031
  • [34] (k, n) secret image sharing scheme with privileged set
    Yang, Ching-Nung
    Li, Peng
    Kuo, Hsin-Chuan
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 73
  • [35] An Image Secret Sharing Method Based on Matrix Theory
    Ding, Wanmeng
    Liu, Kesheng
    Yan, Xuehu
    Wang, Huaixi
    Liu, Lintao
    Gong, Qinghong
    SYMMETRY-BASEL, 2018, 10 (10):
  • [36] A novel image protection scheme using bit-plane compression and secret sharing
    Liu, Yining
    Zhong, Qi
    Shen, Jian
    Chang, Chin-Chen
    JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2017, 40 (02) : 161 - 169
  • [37] A Compact Secret Image Sharing Scheme Based on Flexible Secret Matrix Sharing Scheme
    Wang, Lingfu
    Wang, Jing
    Zhang, Mingwu
    Huang, Weijia
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2021, PT III, 2022, 13157 : 411 - 431
  • [38] Applying Secret Image Sharing to Economics
    Zhao, Xuemei
    Zhang, Tongtong
    Liu, Jun
    Lu, Canju
    Lu, Huan
    Yan, Xuehu
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2021, 13 (04) : 16 - 25
  • [39] AN IMPROVED SCHEME FOR SECRET IMAGE SHARING
    Alharthi, Saeed
    Atrey, Pradeep K.
    2010 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME 2010), 2010, : 1661 - 1666
  • [40] A multi-threshold secret image sharing scheme based on MSP
    Guo, Cheng
    Chang, Chin-Chen
    Qin, Chuan
    PATTERN RECOGNITION LETTERS, 2012, 33 (12) : 1594 - 1600