Secret image sharing scheme based solely on ADDITION

被引:0
作者
Tsai, M. -H. [1 ]
Chen, C. -K. [2 ]
Chen, Y. -F. [3 ]
Chan, Y. -K. [1 ]
Chen, K. -C. [2 ,4 ]
Chu, Y. -P. [5 ]
机构
[1] Natl Chung Hsing Univ, Dept Management Informat Syst, Taichung, Taiwan
[2] Natl Chung Hsing Univ, Dept Appl Math, Taichung, Taiwan
[3] China Med Univ, Dept Hlth Serv Management, Shenyang, Peoples R China
[4] Natl Chung Hsing Univ, Dept Informat Sci, Taichung, Taiwan
[5] Tunghai Univ, Dept Comp Sci & Informat Engn, Taichung, Taiwan
关键词
multimedia security; information hiding; secret sharing;
D O I
10.1179/174313108X283955
中图分类号
TB8 [摄影技术];
学科分类号
0804 ;
摘要
This paper proposes a secret image sharing scheme based on only ADDITION operation to embed a grey level or colour secret image into two or more shadow images. In this scheme, the secret image cannot be reconstructed until all the shadow images have been collected. The secret image can be losslessly recovered. Since only ADDITION operation is used in both creating the shadow images and recovering the secret image, it can be easily and quickly implemented so that this property is very important for many embedded systems, i.e. mobile equipments.
引用
收藏
页码:183 / 188
页数:6
相关论文
共 7 条
[1]  
Blakley G. R., 1979, P NAT COMP C, P313, DOI [DOI 10.1109/MARK.1979.8817296, 10.1109/MARK.1979.8817296]
[2]   Sharing secret images using shadow codebooks [J].
Chang, CC ;
Hwang, RJ .
INFORMATION SCIENCES, 1998, 111 (1-4) :335-345
[3]   Computing watermarks from images using quadtrees [J].
Chang, CC ;
Wu, HC .
SEVENTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS: WORKSHOPS, PROCEEDINGS, 2000, :123-128
[4]  
Lin CC, 2001, WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL 1, PROCEEDINGS, P50
[5]   HOW TO SHARE A SECRET [J].
SHAMIR, A .
COMMUNICATIONS OF THE ACM, 1979, 22 (11) :612-613
[6]  
Thien CC, 2002, COMPUT GRAPH-UK, V26, P766
[7]  
TSO R, 2006, THESIS U TSUKUBA JAP