A Novel Hierarchical Threshold Secret Image Sharing Scheme

被引:0
作者
Qin, Shiyue [1 ]
Tan, Zhenhua [2 ]
Li, Hong [2 ]
机构
[1] Northeastern Univ, Sch Comp Sci & Engn, Shenyang, Peoples R China
[2] Northeastern Univ, Software Coll, Shenyang, Peoples R China
来源
2020 IEEE INTL SYMP ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, INTL CONF ON BIG DATA & CLOUD COMPUTING, INTL SYMP SOCIAL COMPUTING & NETWORKING, INTL CONF ON SUSTAINABLE COMPUTING & COMMUNICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2020) | 2020年
基金
中国国家自然科学基金;
关键词
secret sharing; visual cryptography; hierarchical threshold;
D O I
10.1109/ISPA-BDCloud-SocialCom-SustainCom51426.2020.00173
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a novel hierarchical visual cryptography scheme to protect secret image by designing secret sharing and recover procedures. The polynomial coefficients are generated using the projection matrix method, and shadows are generated for different levels of participants based on the Birkhoff interpolation method. The proposed hierarchical secret sharing processes and recover processes are proposed in detail by mathematical design, utilizing the random matrix to generate the polynomial coefficients and generating quite different secret shadow image to each participant. Security analysis and experiments prove that the proposed scheme is effective and can defend fake shadow attacks and collusion attacks.
引用
收藏
页码:1163 / 1167
页数:5
相关论文
共 12 条
[1]  
Basit A, 2017, 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), P557, DOI 10.1109/CCAA.2017.8229863
[2]   General mean value and remainder theorems with applications to mechanical differentiation and ouadrature [J].
Birkhoff, George David .
TRANSACTIONS OF THE AMERICAN MATHEMATICAL SOCIETY, 1906, 7 (1-4) :107-136
[3]  
Blakley G.R., 1979, P 1979 AFIPS NAT COM, P313
[4]   Threshold Visual Cryptography Schemes With Tagged Shares [J].
Chiu, Pei-Ling ;
Lee, Kai-Hui .
IEEE ACCESS, 2020, 8 :111330-111346
[5]   A hierarchical threshold secret image sharing [J].
Guo, Cheng ;
Chang, Chin-Chen ;
Qin, Chuan .
PATTERN RECOGNITION LETTERS, 2012, 33 (01) :83-91
[6]  
Naor M., 1995, Advances in Cryptology - EUROCRYPT '94. Workshop on the Theory and Application of Cryptographic Techniques. Proceedings, P1, DOI 10.1007/BFb0053419
[7]   Introducing Augmented Reality to Optical Coherence Tomography in Ophthalmic Microsurgery [J].
Roodaki, Hessam ;
Filippatos, Konstantinos ;
Eslami, Abouzar ;
Navab, Nassir .
2015 IEEE International Symposium on Mixed and Augmented Reality, 2015, :1-6
[8]   HOW TO SHARE A SECRET [J].
SHAMIR, A .
COMMUNICATIONS OF THE ACM, 1979, 22 (11) :612-613
[9]   Distributed Secret Sharing Scheme Based on Personalized Spherical Coordinates Space [J].
Tan, Zhenhua ;
Yang, Guangming ;
Cheng, Wei ;
Wang, Xingwei .
COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2013, 10 (03) :1269-1291
[10]   Hierarchical threshold secret sharing [J].
Tassa, Tamir .
JOURNAL OF CRYPTOLOGY, 2007, 20 (02) :237-264