A novel secret image sharing scheme using large primes

被引:25
作者
Ghebleh, Mohammad [1 ]
Kanso, Ali [1 ]
机构
[1] Kuwait Univ, Dept Math, POB 5969, Safat 13060, Kuwait
关键词
Secret sharing; Secret image sharing; (t; n)-threshold scheme; Chaos; Skew tent map; AUTHENTICATION; STEGANOGRAPHY;
D O I
10.1007/s11042-017-4841-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A secret image sharing scheme is any method of distributing shares of a secret image amongst a set of peers, such that the secret may be revealed only with participation of all members of a qualified set of peers. Following Shamir's (t, n)-threshold scheme, we propose a novel lossy/lossless secret image sharing scheme, that improves existing schemes in terms of security and performance. As opposed to the usual convention of representing a digital image by a collection of 8-bit integer values, we consider 8b-bit values where b is a positive integer. This approach accommodates a larger finite field, which in turn produces a less intrusive secret image sharing scheme. Extensive empirical results are presented to demonstrate the efficiency and robustness of the proposed scheme.
引用
收藏
页码:11903 / 11923
页数:21
相关论文
共 22 条
[1]  
Blakley GR, 1979, SAFEGUARDING CRYPTOG
[2]   Sharing secrets in stego images with authentication [J].
Chang, Chin-Chen ;
Hsieh, Yi-Pei ;
Lin, Chia-Hsuan .
PATTERN RECOGNITION, 2008, 41 (10) :3130-3137
[3]   less and unlimited multi-image sharing based on Chinese remainder theorem and Lagrange interpolation [J].
Chang, Chin-Chen ;
Ngoc-Tu Huynh ;
Le, Hai-Duong .
SIGNAL PROCESSING, 2014, 99 :159-170
[4]   The dynamic mass transfer of surfactants upon droplet formation in coaxial microfluidic devices [J].
Chen, Yang ;
Liu, Guo-Tao ;
Xu, Jian-Hong ;
Luo, Guang-Sheng .
CHEMICAL ENGINEERING SCIENCE, 2015, 132 :1-8
[5]   A sudoku-based secret image sharing scheme with reversibility [J].
Chang C.-C. ;
Lin P.-Y. ;
Wang Z.H. ;
Li M.C. .
Journal of Communications, 2010, 5 (01) :5-12
[6]   A robust chaotic algorithm for digital image steganography [J].
Ghebleh, M. ;
Kanso, A. .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2014, 19 (06) :1898-1907
[7]   A novel (n, t, n) secret image sharing scheme without a trusted third party [J].
Guo, Cheng ;
Chang, Chin-Chen ;
Qin, Chuan .
MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 72 (03) :2195-2209
[8]   An efficient (t,n)-threshold secret image sharing scheme [J].
Kanso, Ali ;
Ghebleh, Mohammad .
MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (15) :16369-16388
[9]   Mapping of Novel QTL Regulating Grain Shattering Using Doubled Haploid Population in Rice (Oryza sativa L.) [J].
Lee, Gyu-Ho ;
Kang, In-Kyu ;
Kim, Kyung-Min .
INTERNATIONAL JOURNAL OF GENOMICS, 2016, 2016
[10]   Secret image sharing with steganography and authentication [J].
Lin, CC ;
Tsai, WH .
JOURNAL OF SYSTEMS AND SOFTWARE, 2004, 73 (03) :405-414