A NOVEL IMAGE SECRET SHARING SCHEME WITH MEANINGFUL SHARES

被引:0
作者
Cai, Hongliang [1 ,2 ]
Liu, Huajian [2 ]
Yuan, Qizhao [1 ]
Steinebach, Martin [2 ]
Wang, Xiaojing [1 ]
机构
[1] Chinese Acad Sci, Chengdu Inst Comp Applicat, Beijing, Peoples R China
[2] Fraunhofer SIT, Darmstadt, Germany
来源
2015 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING (ICASSP) | 2015年
关键词
image secret sharing; image encryption; multimedia security; coding theory; VISUAL CRYPTOGRAPHY; COLOR IMAGES;
D O I
暂无
中图分类号
O42 [声学];
学科分类号
070206 ; 082403 ;
摘要
In this paper a novel (t, n) threshold image secret sharing scheme is proposed. Based on the idea that there is close connection between secret sharing and coding theory, coding method on GF(2(m)) is applied in our scheme instead of the classical Lagrange's interpolation method in order to deal with the fidelity loss problem in the recovery. All the generated share images are meaningful and the size of each share image is the same as the secret image. The analysis proves our scheme is perfect and ideal and also has high security. The experiment results demonstrate that all the shares have high quality and the secret image can be recovered exactly.
引用
收藏
页码:1767 / 1771
页数:5
相关论文
共 17 条
[1]   A secure scheme to share secret color images [J].
Alvarez, G ;
Encinas, AH ;
Encinas, LH ;
del Rey, AM .
COMPUTER PHYSICS COMMUNICATIONS, 2005, 173 (1-2) :9-16
[2]  
[Anonymous], 1978, The Theory of Error-Correcting Codes
[3]  
Blakley GR, 1995, PROCEEDINGS 1995 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, P488, DOI 10.1109/ISIT.1995.550475
[4]   A novel secret image sharing scheme in color images using small shadow images [J].
Chang, Chin-Chen ;
Lin, Chia-Chen ;
Lin, Chia-Hsuan ;
Chen, Yi-Hui .
INFORMATION SCIENCES, 2008, 178 (11) :2433-2447
[5]   Probabilistic visual cryptography schemes [J].
Cimato, S ;
De Prisco, R ;
De Santis, A .
COMPUTER JOURNAL, 2006, 49 (01) :97-107
[6]   THE BREADTH OF SHAMIR SECRET-SHARING SCHEME [J].
DAWSON, E ;
DONOVAN, D .
COMPUTERS & SECURITY, 1994, 13 (01) :69-78
[7]  
Ito R, 1999, IEICE T FUND ELECTR, VE82A, P2172
[8]  
Massey J. L., 1993, P 6 JOINT SWED RUSS, P276
[9]   ON SHARING SECRETS AND REED-SOLOMON CODES [J].
MCELIECE, RJ ;
SARWATE, DV .
COMMUNICATIONS OF THE ACM, 1981, 24 (09) :583-584
[10]  
Naor M., 1995, LECT NOTES COMPUTER, V950, P1, DOI [10.1007/BFb0053419, DOI 10.1007/BFB0053419]