Extended Secret Image Sharing with Lossless Recovery Based on Chinese Remainder Theorem and Quick Response Code

被引:0
作者
Jiang, Yue [1 ]
Lu, Yuliang [1 ]
Yan, Xuehu [1 ]
Liu, Lintao [1 ]
机构
[1] Natl Univ Def Technol, Hefei 230037, Anhui, Peoples R China
来源
2018 IEEE 3RD INTERNATIONAL CONFERENCE ON IMAGE, VISION AND COMPUTING (ICIVC) | 2018年
基金
中国国家自然科学基金;
关键词
secret image sharing; extended secret image sharing; Chinese remainder theorem; QR code (k; n); threshold; lossless recovery;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Extended secret image sharing (SIS) has meaningful shadow, the meaningful shadow will decrease encryption suspiciousness when we transfer secret image via public channels. Chinese Remainder Theorem (CRT) based SIS (CRTSIS) has the advantages of lossless recovery and low recovery computation complexity. Quick Response Code (QR) has become more and more common in our daily life. In this paper, based on CRT and QR, we propose a SIS algorithm for (k, n) threshold with meaningful share and lossless recovery. We choose QR code as the carrier to output valid QR code, which can be scanned to decode. When we collect any k or more shares out of total n shares, the secret image will be recovered losslessly by CRT. We carry out three experiments to illustrate the feasibility and effectiveness of our algorithm.
引用
收藏
页码:678 / 683
页数:6
相关论文
共 15 条
[1]  
[Anonymous], 2017, J REAL-TIME IMAGE PR
[2]  
[Anonymous], 2006, INF TECHN AUT ID DAT
[3]  
Beimel Amos, 2011, Coding and Cryptology. Proceedings of the Third International Workshop, IWCC 2011, P11, DOI 10.1007/978-3-642-20901-7_2
[4]   Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing [J].
Chow, Yang-Wai ;
Susilo, Willy ;
Yang, Guomin ;
Phillips, James G. ;
Pranata, Ilung ;
Barmawi, Ari Moesriami .
INFORMATION SECURITY AND PRIVACY, PT I, 2016, 9722 :409-425
[5]  
Naor M., 1995, LECT NOTES COMPUTER, V950, P1, DOI [10.1007/BFb0053419, DOI 10.1007/BFB0053419]
[6]  
Saito K, 2011, TECH REPORT IEICE IS, V111, P79
[7]  
Snyder A. J., 2012, PATTERN RECOGN, V21, P9901
[8]   On general construction for extended visual cryptography schemes [J].
Wang, Daoshun ;
Yi, Feng ;
Li, Xiaobo .
PATTERN RECOGNITION, 2009, 42 (11) :3071-3082
[9]  
Wang G., 2014, MULTIMED TOOLS APPL, V75, P1
[10]  
Wang Z., 2009, HALFTONE VISUAL CRYP