Essential secret image sharing scheme with different importance of shadows

被引:77
|
作者
Li, Peng [1 ]
Yang, Ching-Nung [2 ]
Wu, Chih-Cheng [2 ]
Kong, Qian [1 ]
Ma, Yanpeng [1 ]
机构
[1] North China Elect Power Univ, Dept Math & Phys, Baoding 071003, Hebei, Peoples R China
[2] Natl Dong Hwa Univ, Dept CSIE, Taipei, Taiwan
关键词
Secret sharing; Secret image sharing; Essential shadow image; Lagrange's interpolation; Information hiding; Visual cryptography; Visual secret sharing; Image processing; STEGANOGRAPHY; AUTHENTICATION; IMPROVEMENTS;
D O I
10.1016/j.jvcir.2013.07.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In (k, n) secret image sharing (SIS), a scheme encrypts a secret image into n shadow images. Any k or more shadow images can be collaborated together to reveal the secret image. Most of the previous SIS schemes don't distinguish the importance of shadows. However, in some application environments, some participants are accorded special privileges due to their status or importance. Thus, some shadows may be more important than others. In this paper, we consider the (t, s, k, n) essential SIS (ESIS) scheme. All n shadows are classified into s essential shadows and (n-s) non-essential shadows. When reconstructing the secret image, the (t, s, k, n)-ESIS scheme needs k shadows, which should include at least t essential shadows. (C) 2013 Elsevier Inc. All rights reserved.
引用
收藏
页码:1106 / 1114
页数:9
相关论文
共 50 条
  • [41] Enhanced Boolean-based multi secret image sharing scheme
    Yang, Ching-Nung
    Chen, Cheng-Hua
    Cai, Song-Ruei
    JOURNAL OF SYSTEMS AND SOFTWARE, 2016, 116 : 22 - 34
  • [42] (t, n) Threshold secret image sharing scheme with adversary structure
    Guo, Cheng
    Yuan, Qiongqiong
    Lu, Kun
    Li, Mingchu
    Fu, Zhangjie
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (20) : 21193 - 21210
  • [43] Reversible secret image sharing scheme in encrypted images
    Sang-Ho Shin
    Ki-Hyun Jung
    Multimedia Tools and Applications, 2016, 75 : 13931 - 13949
  • [44] Reversible secret image sharing scheme in encrypted images
    Shin, Sang-Ho
    Jung, Ki-Hyun
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (21) : 13931 - 13949
  • [45] A grouped-scalable secret image sharing scheme
    Liu, Wenjie
    Wang, Anhong
    Chang, Chin-Chen
    Li, Zhihong
    Liu, Li
    MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (17) : 7095 - 7109
  • [46] A novel weighted threshold secret image sharing scheme
    Li, Mingchu
    Ma, Shu
    Guo, Cheng
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3083 - 3093
  • [47] New Condition for Hierarchical Secret Image Sharing Scheme
    Espejel-Trujillo, Angelina
    Nakano-Miyatake, Mariko
    Perez-Meana, Hector
    2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2014, : 240 - 244
  • [48] A Novel Hierarchical Threshold Secret Image Sharing Scheme
    Qin, Shiyue
    Tan, Zhenhua
    Li, Hong
    2020 IEEE INTL SYMP ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, INTL CONF ON BIG DATA & CLOUD COMPUTING, INTL SYMP SOCIAL COMPUTING & NETWORKING, INTL CONF ON SUSTAINABLE COMPUTING & COMMUNICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2020), 2020, : 1163 - 1167
  • [49] Secret image sharing scheme based solely on ADDITION
    Tsai, M. -H.
    Chen, C. -K.
    Chen, Y. -F.
    Chan, Y. -K.
    Chen, K. -C.
    Chu, Y. -P.
    IMAGING SCIENCE JOURNAL, 2008, 56 (04): : 183 - 188
  • [50] A new image secret sharing scheme to identify cheaters
    Zhao, Rong
    Zhao, Jian-jie
    Dai, Fang
    Zhao, Feng-qun
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (01) : 252 - 257