Secret image sharing with smaller shadow sizes for general access structures

被引:3
作者
Chen, Ying-Ru [1 ]
Chen, Ling-Hwei [2 ]
Shyu, Shyong Jian [3 ]
机构
[1] Natl Chiao Tung Univ, Inst Comp Sci & Engn, 1001 Ta Hsueh Rd, Hsinchu 300, Taiwan
[2] Natl Chiao Tung Univ, Dept Comp Sci, 1001 Ta Hsueh Rd, Hsinchu 300, Taiwan
[3] Ming Chuan Univ, Dept Comp Sci & Informat Engn, 5 De Ming Rd, Taoyuan 333, Taiwan
关键词
Shadow size; Secret image sharing; General access structure; SCHEMES;
D O I
10.1007/s11042-015-2734-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the area of secret image sharing (SIS), most papers focused on the schemes for threshold or some special access structures. Regarding general access structures (GAS), few results have been found in the literature. Two SIS schemes for GAS were proposed in 2001 and 2010, both are based on qualified sets. However, one distorts the reconstructed secret image, and some extra information is needed in both schemes. Here, we propose three polynomial based SIS schemes for GAS. Considering either qualified or forbidden sets, these schemes can reconstruct the secret image perfectly without any extra information needed. Some proof and analysis on the shadow sizes of the three schemes are given to lead us to choose the one with the smallest size. In addition, we also give some comparisons with two existing schemes, and security issue is also addressed in conclusion.
引用
收藏
页码:13913 / 13929
页数:17
相关论文
共 14 条
  • [1] Visual cryptography for general access structures
    Ateniese, G
    Blundo, C
    DeSantis, A
    Stinson, DR
    [J]. INFORMATION AND COMPUTATION, 1996, 129 (02) : 86 - 106
  • [2] BENALOH J, 1990, LECT NOTES COMPUT SC, V403, P27
  • [3] Blakley G. R., 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK), P313, DOI 10.1109/MARK.1979.8817296
  • [4] less and unlimited multi-image sharing based on Chinese remainder theorem and Lagrange interpolation
    Chang, Chin-Chen
    Ngoc-Tu Huynh
    Le, Hai-Duong
    [J]. SIGNAL PROCESSING, 2014, 99 : 159 - 170
  • [5] Guo C, 2013, JIH MSP, V4, P1
  • [6] Horng G, 2001, J INF SCI ENG, V17, P959
  • [7] Ito M., 1987, P IEEE GLOBECOM, P99
  • [8] Optimal multiple assignments based on integer programming in secret sharing schemes with general access structures
    Iwamoto, Mitsugu
    Yamamoto, Hirosuke
    Ogawa, Hirohisa
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2007, E90A (01) : 101 - 112
  • [9] ALGORITHM FOR VECTOR QUANTIZER DESIGN
    LINDE, Y
    BUZO, A
    GRAY, RM
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 1980, 28 (01) : 84 - 95
  • [10] HOW TO SHARE A SECRET
    SHAMIR, A
    [J]. COMMUNICATIONS OF THE ACM, 1979, 22 (11) : 612 - 613