A Lossless Linear Algebraic Secret Image Sharing Scheme

被引:6
作者
Kanso, Ali [1 ]
Ghebleh, Mohammad [1 ]
Alazemi, Abdullah [1 ]
机构
[1] Kuwait Univ, Dept Math, POB 5969, Safat 13060, Kuwait
关键词
secret sharing; secret image sharing; (k; n)-threshold scheme; admissible tracks; chaos; ALGORITHM; STEGANOGRAPHY; QUALITY;
D O I
10.15388/20-INFOR420
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A (k, n)-threshold secret image sharing scheme is any method of distributing a secret image amongst n participants in such a way that any k participants are able to use their shares collectively to reconstruct the secret image, while fewer than k shares do not reveal any information about the secret image. In this work, we propose a lossless linear algebraic (k, n)-threshold secret image sharing scheme. The scheme associates a vector v(i) to the ith participant in the vector space F-2(k)alpha, where the vectors v(i) satisfy some admissibility conditions. The ith share is simply a linear combination of the vectors v(i) with coefficients from the secret image. Simulation results demonstrate the effectiveness and robustness of the proposed scheme compared to standard statistical attacks on secret image sharing schemes. Furthermore, the proposed scheme has a high level of security, error-resilient capability, and the size of each share is 1/k the size of the secret image. In comparison with existing work, the scheme is shown to be very competitive.
引用
收藏
页码:499 / 522
页数:24
相关论文
共 48 条
[1]   A new meaningful secret sharing scheme based on random grids, error diffusion and chaotic encryption [J].
Abd El-Latif, Ahmed A. ;
Yan, Xuehu ;
Li, Li ;
Wang, Ning ;
Peng, Jia-Liang ;
Niu, Xiamu .
OPTICS AND LASER TECHNOLOGY, 2013, 54 :389-400
[2]  
[Anonymous], 1979, P NAT COMP C
[3]  
[Anonymous], 2009, INT J CIRCUITS SYSTE
[4]  
Arnold V. I., 1968, Ergodic problems of classical mechanics
[5]   A MODULAR APPROACH TO KEY SAFEGUARDING [J].
ASMUTH, C ;
BLOOM, J .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :208-210
[6]  
Bai L, 2006, DASC 2006: 2ND IEEE INTERNATIONAL SYMPOSIUM ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, P31
[7]   Sharing secret images using shadow codebooks [J].
Chang, CC ;
Hwang, RJ .
INFORMATION SCIENCES, 1998, 111 (1-4) :335-345
[8]   Sharing secrets in stego images with authentication [J].
Chang, Chin-Chen ;
Hsieh, Yi-Pei ;
Lin, Chia-Hsuan .
PATTERN RECOGNITION, 2008, 41 (10) :3130-3137
[9]  
Chang CC, 2006, ICICIC 2006: FIRST INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING, INFORMATION AND CONTROL, VOL 3, PROCEEDINGS, P467
[10]   A symmetric image encryption scheme based on 3D chaotic cat maps [J].
Chen, GR ;
Mao, YB ;
Chui, CK .
CHAOS SOLITONS & FRACTALS, 2004, 21 (03) :749-761