A NOVEL IMAGE SECRET SHARING SCHEME WITH MEANINGFUL SHARES

被引:0
作者
Cai, Hongliang [1 ,2 ]
Liu, Huajian [2 ]
Yuan, Qizhao [1 ]
Steinebach, Martin [2 ]
Wang, Xiaojing [1 ]
机构
[1] Chinese Acad Sci, Chengdu Inst Comp Applicat, Beijing, Peoples R China
[2] Fraunhofer SIT, Darmstadt, Germany
来源
2015 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING (ICASSP) | 2015年
关键词
image secret sharing; image encryption; multimedia security; coding theory; VISUAL CRYPTOGRAPHY; COLOR IMAGES;
D O I
暂无
中图分类号
O42 [声学];
学科分类号
070206 ; 082403 ;
摘要
In this paper a novel (t, n) threshold image secret sharing scheme is proposed. Based on the idea that there is close connection between secret sharing and coding theory, coding method on GF(2(m)) is applied in our scheme instead of the classical Lagrange's interpolation method in order to deal with the fidelity loss problem in the recovery. All the generated share images are meaningful and the size of each share image is the same as the secret image. The analysis proves our scheme is perfect and ideal and also has high security. The experiment results demonstrate that all the shares have high quality and the secret image can be recovered exactly.
引用
收藏
页码:1767 / 1771
页数:5
相关论文
共 50 条
[41]   Two-in-One Image Secret Sharing Scheme Based on Boolean Operations [J].
Li, Peng ;
Yang, Ching-Nung ;
Kong, Qian .
DIGITAL-FORENSICS AND WATERMARKING, IWDW 2014, 2015, 9023 :305-318
[42]   An Image Watermarking Scheme using Threshold Based Secret Sharing [J].
Latha, S. Bhargavi ;
Reddy, D. Venkata ;
Damodaram, A. .
2017 7TH IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2017, :619-623
[43]   Progressive Secret Image Sharing Scheme Based on Semantic Segmentation [J].
Zhang, Lina ;
Zheng, Xiangqin ;
Liu, Ying .
IEEE ACCESS, 2020, 8 :173289-173297
[44]   Threshold Visual Cryptographic Scheme With Meaningful Shares [J].
Shyu, Shyong Jian .
IEEE SIGNAL PROCESSING LETTERS, 2014, 21 (12) :1521-1525
[45]   A reversible and lossless secret image sharing scheme with authentication for color [J].
Li, Wendan ;
Peng, Changgen ;
Tan, Weijie ;
Xu, Yi ;
Niu, Kun .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2023, 35 (10)
[46]   An efficient (t,n)-threshold secret image sharing scheme [J].
Kanso, Ali ;
Ghebleh, Mohammad .
MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (15) :16369-16388
[47]   An Implementation of Image Secret Sharing Scheme Based on Matrix Operations [J].
Ren, Zihan ;
Li, Peng ;
Wang, Xin .
MATHEMATICS, 2022, 10 (06)
[48]   A new approach of Secret Image Sharing using Verifiable Scheme [J].
Rao, Jyoti ;
Venny, Priya .
2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, :1134-1139
[49]   Essential secret image sharing scheme with different importance of shadows [J].
Li, Peng ;
Yang, Ching-Nung ;
Wu, Chih-Cheng ;
Kong, Qian ;
Ma, Yanpeng .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2013, 24 (07) :1106-1114
[50]   Efficient Secret Image Sharing Scheme with Authentication and Cheating Prevention [J].
Zhang, Lina ;
Dang, Xuan ;
Feng, Li ;
Yang, Junhan .
MATHEMATICAL PROBLEMS IN ENGINEERING, 2021, 2021