Quadri-directional searching algorithm for secret image sharing using meaningful shadows

被引:22
作者
Ngoc-Tu Huynh [1 ,4 ]
Bharanitharan, K. [2 ,3 ]
Chang, Chin-Chen [1 ]
机构
[1] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
[2] Feng Chia Univ, Dept Commun Engn, Taichung 40724, Taiwan
[3] Univ Auckland, Dept Management & Int Business, Auckland 1, New Zealand
[4] Univ Da Nang, Coll Informat & Technol, Da Nang City, Vietnam
关键词
Secret image sharing; Meaningful shadows; Sudoku matrix; Searching algorithm; Visual secret sharing; Low-complexity; Pixel expansion; High quality; ERROR DIFFUSION; VISUAL QUALITY;
D O I
10.1016/j.jvcir.2015.01.011
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Contrary to conventional protecting data such as cryptographic techniques which encrypt the data with a secret key, secret sharing takes an approach to ensure well protection of transmitted information by allowing a secret message M to be divided into n pieces. Secret message M can be held by n participants to avoid the secret from incidentally or intentionally being lost. In a secret sharing scheme, secret information leaks from shadows, attack on shadow image, and large shadow image issues which has arisen when developing an algorithm. Although existing algorithms provide remedies for such problems, the computational complexity of existing algorithms is still questionable. Therefore, we propose a low computational complexity Quadri-Directional Searching Algorithm (QDSA) for secret image sharing. Experiment results show that the proposed algorithm ensures that generated shares are of high quality and no secret information is leaked from these shares, thus it guarantees high security of our scheme. (C) 2015 Elsevier Inc. All rights reserved.
引用
收藏
页码:105 / 112
页数:8
相关论文
共 19 条
[1]   A new meaningful secret sharing scheme based on random grids, error diffusion and chaotic encryption [J].
Abd El-Latif, Ahmed A. ;
Yan, Xuehu ;
Li, Li ;
Wang, Ning ;
Peng, Jia-Liang ;
Niu, Xiamu .
OPTICS AND LASER TECHNOLOGY, 2013, 54 :389-400
[2]  
[Anonymous], 1994, WORKSHOP THEORY APPL, DOI 10.1007/BFb0053419
[3]  
Blakley G. R., 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK), P313, DOI 10.1109/MARK.1979.8817296
[4]   Self-Verifying Visual Secret Sharing Using Error Diffusion and Interpolation Techniques [J].
Chang, Chin-Chen ;
Lin, Chia-Chen ;
Le, T. Hoang Ngan ;
Le, Hoai Bac .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2009, 4 (04) :790-801
[5]   Sharing a verifiable secret image using two shadows [J].
Chang, Chin-Chen ;
Lin, Chia-Chen ;
Le, T. Hoang Ngan ;
Le, Hoai Bac .
PATTERN RECOGNITION, 2009, 42 (11) :3097-3114
[6]  
Chang Chin-Chen., 2008, 2008 3 INT C INN COM, P17, DOI DOI 10.1109/ICICIC.2008.149
[7]   A sudoku-based secret image sharing scheme with reversibility [J].
Chang C.-C. ;
Lin P.-Y. ;
Wang Z.H. ;
Li M.C. .
Journal of Communications, 2010, 5 (01) :5-12
[8]   Inverse halftoning algorithm using edge-based lookup table approach [J].
Chung, KL ;
Wu, ST .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2005, 14 (10) :1583-1589
[9]   A hierarchical threshold secret image sharing [J].
Guo, Cheng ;
Chang, Chin-Chen ;
Qin, Chuan .
PATTERN RECOGNITION LETTERS, 2012, 33 (01) :83-91
[10]  
Kieu T.D., 2009, INT J SMART HOME, V3