A NOVEL IMAGE SECRET SHARING SCHEME WITH MEANINGFUL SHARES

被引:0
作者
Cai, Hongliang [1 ,2 ]
Liu, Huajian [2 ]
Yuan, Qizhao [1 ]
Steinebach, Martin [2 ]
Wang, Xiaojing [1 ]
机构
[1] Chinese Acad Sci, Chengdu Inst Comp Applicat, Beijing, Peoples R China
[2] Fraunhofer SIT, Darmstadt, Germany
来源
2015 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING (ICASSP) | 2015年
关键词
image secret sharing; image encryption; multimedia security; coding theory; VISUAL CRYPTOGRAPHY; COLOR IMAGES;
D O I
暂无
中图分类号
O42 [声学];
学科分类号
070206 ; 082403 ;
摘要
In this paper a novel (t, n) threshold image secret sharing scheme is proposed. Based on the idea that there is close connection between secret sharing and coding theory, coding method on GF(2(m)) is applied in our scheme instead of the classical Lagrange's interpolation method in order to deal with the fidelity loss problem in the recovery. All the generated share images are meaningful and the size of each share image is the same as the secret image. The analysis proves our scheme is perfect and ideal and also has high security. The experiment results demonstrate that all the shares have high quality and the secret image can be recovered exactly.
引用
收藏
页码:1767 / 1771
页数:5
相关论文
共 17 条
[11]   HOW TO SHARE A SECRET [J].
SHAMIR, A .
COMMUNICATIONS OF THE ACM, 1979, 22 (11) :612-613
[12]  
Thien CC, 2002, COMPUT GRAPH-UK, V26, P766
[13]   An image-sharing method with user-friendly shadow images [J].
Thien, CC ;
Lin, JC .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2003, 13 (12) :1161-1169
[14]  
van Dijk M., 1995, Designs, Codes and Cryptography, V6, P143, DOI 10.1007/BF01398012
[15]   Sharing and hiding secret images with size constraint [J].
Wu, YS ;
Thien, CC ;
Lin, JC .
PATTERN RECOGNITION, 2004, 37 (07) :1377-1385
[16]   New visual secret sharing schemes using probabilistic method [J].
Yang, CN .
PATTERN RECOGNITION LETTERS, 2004, 25 (04) :481-494
[17]  
Yi Feng, 2008, Journal of Tsinghua University (Science and Technology), V48, P121