A NOVEL IMAGE SECRET SHARING SCHEME WITH MEANINGFUL SHARES

被引:0
作者
Cai, Hongliang [1 ,2 ]
Liu, Huajian [2 ]
Yuan, Qizhao [1 ]
Steinebach, Martin [2 ]
Wang, Xiaojing [1 ]
机构
[1] Chinese Acad Sci, Chengdu Inst Comp Applicat, Beijing, Peoples R China
[2] Fraunhofer SIT, Darmstadt, Germany
来源
2015 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING (ICASSP) | 2015年
关键词
image secret sharing; image encryption; multimedia security; coding theory; VISUAL CRYPTOGRAPHY; COLOR IMAGES;
D O I
暂无
中图分类号
O42 [声学];
学科分类号
070206 ; 082403 ;
摘要
In this paper a novel (t, n) threshold image secret sharing scheme is proposed. Based on the idea that there is close connection between secret sharing and coding theory, coding method on GF(2(m)) is applied in our scheme instead of the classical Lagrange's interpolation method in order to deal with the fidelity loss problem in the recovery. All the generated share images are meaningful and the size of each share image is the same as the secret image. The analysis proves our scheme is perfect and ideal and also has high security. The experiment results demonstrate that all the shares have high quality and the secret image can be recovered exactly.
引用
收藏
页码:1767 / 1771
页数:5
相关论文
共 50 条
[31]   New Condition for Hierarchical Secret Image Sharing Scheme [J].
Espejel-Trujillo, Angelina ;
Nakano-Miyatake, Mariko ;
Perez-Meana, Hector .
2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2014, :240-244
[32]   A JOINT SECRET IMAGE SHARING AND JPEG COMPRESSION SCHEME [J].
Yriarte, Felix ;
Puteaux, Pauline ;
Puech, William .
2022 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, ICIP, 2022, :581-585
[33]   Secret image sharing scheme based solely on ADDITION [J].
Tsai, M. -H. ;
Chen, C. -K. ;
Chen, Y. -F. ;
Chan, Y. -K. ;
Chen, K. -C. ;
Chu, Y. -P. .
IMAGING SCIENCE JOURNAL, 2008, 56 (04) :183-188
[34]   A (t, n) secret sharing scheme for image encryption [J].
Shi Runhua ;
Zhong Hong ;
Huang Liusheng ;
Luo Yonglong .
CISP 2008: FIRST INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOL 3, PROCEEDINGS, 2008, :3-+
[35]   A novel secret image sharing scheme for true-color images with size constraint [J].
Tsai, Du-Shiau ;
Horng, Gwoboa ;
Chen, Tzung-Her ;
Huang, Yao-Te .
INFORMATION SCIENCES, 2009, 179 (19) :3247-3254
[36]   A novel image protection scheme using bit-plane compression and secret sharing [J].
Liu, Yining ;
Zhong, Qi ;
Shen, Jian ;
Chang, Chin-Chen .
JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2017, 40 (02) :161-169
[37]   A Novel Image Secret Sharing Scheme without Third-Party Scrambling Method [J].
Weitong Hu ;
Ye Yao ;
Di Zhou ;
Qiuhua Zheng ;
Kim-Kwang Raymond Choo .
Mobile Networks and Applications, 2019, 24 :1317-1335
[38]   A Novel Image Secret Sharing Scheme without Third-Party Scrambling Method [J].
Hu, Weitong ;
Yao, Ye ;
Zhou, Di ;
Zheng, Qiuhua ;
Choo, Kim-Kwang Raymond .
MOBILE NETWORKS & APPLICATIONS, 2019, 24 (04) :1317-1335
[39]   An image authentication scheme based on digital watermarking and image secret sharing [J].
Hsieh, Shang-Lin ;
Tsai, I-Ju ;
Yeh, Chung-Ping ;
Chang, Chia-Ming .
MULTIMEDIA TOOLS AND APPLICATIONS, 2011, 52 (2-3) :597-619
[40]   An image authentication scheme based on digital watermarking and image secret sharing [J].
Shang-Lin Hsieh ;
I-Ju Tsai ;
Chung-Ping Yeh ;
Chia-Ming Chang .
Multimedia Tools and Applications, 2011, 52 :597-619