Polynomial Based Progressive Secret Image Sharing Scheme With Smaller Shadow Size

被引:12
作者
Guo, Yongzhen [1 ,2 ]
Ma, Zhuo [3 ]
Zhao, Meng [3 ]
机构
[1] Beijing Inst Technol, Sch Automat, Beijing 100081, Peoples R China
[2] China Software Testing Ctr, Beijing 100048, Peoples R China
[3] Xidian Univ, Sch Cyber Engn, Xian 710071, Shaanxi, Peoples R China
来源
IEEE ACCESS | 2019年 / 7卷
基金
中国国家自然科学基金;
关键词
Interpolated polynomial; progressive secret image sharing; shadow size; smooth; CONSTRUCTIONS; ENCRYPTION;
D O I
10.1109/ACCESS.2019.2919294
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Progressive secret image sharing (PSIS) scheme attracts the interests of researchers in recent years. Many approaches have been proposed to construct PSIS schemes. In most of these schemes, the size of the shadow is expanded from the original image. On the contrary, polynomial-based PSIS can reduce shadow size from the original image. Recently, Yang and Huang proposed a polynomial-based (k, n) PSIS, where the image can be progressively reconstructed from k to n shadows. However, the problem of Yang-Huang's scheme is that the percentage of the recovered partial image from t shadows is extremely low when t is close to k. Later, Yang and Chu constructed another polynomial-based (k, n) PSIS with smooth property to solve this problem, but the size of the shadow is expanded greatly from Yang-Huang' scheme. In this paper, we propose a new (k, n) PSIS based on polynomial to overcome the drawbacks of these two schemes. In our scheme, t shadows (t is close to k) can recover more percentage partial image than Yang-Huang's scheme with a little shadow size expansion; comparing with Yang-Chu's scheme, our scheme achieves almost the same smooth property with much smaller shadow size.
引用
收藏
页码:73782 / 73789
页数:8
相关论文
共 32 条
[1]   Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications [J].
Chen, Chien-Ming ;
Wang, King-Hang ;
Yeh, Kuo-Hui ;
Xiang, Bin ;
Wu, Tsu-Yang .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (08) :3133-3142
[2]   A Secure Authentication Protocol for Internet of Vehicles [J].
Chen, Chien-Ming ;
Xiang, Bin ;
Liu, Yining ;
Wang, King-Hang .
IEEE ACCESS, 2019, 7 :12047-12057
[3]   Secret sharing: using meaningful image shadows based on Gray code [J].
Cheng, Ting-Fang ;
Chang, Ching-Chun ;
Liu, Li .
MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (07) :9337-9362
[4]   Block-based progressive visual secret sharing [J].
Hou, Young-Chang ;
Quan, Zen-Yu ;
Tsai, Chih-Fong ;
Tseng, A-Yu .
INFORMATION SCIENCES, 2013, 233 :290-304
[5]   Greyscale-images-oriented progressive secret sharing based on the linear congruence equation [J].
Liu, Lintao ;
Lu, Yuliang ;
Yan, Xuehu ;
Wang, Huaixi .
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (16) :20569-20596
[6]   Progressive (k, n) secret image sharing Scheme with meaningful shadow images by GEMD and RGEMD [J].
Liu, Yan-Xiao ;
Yang, Ching-Nung ;
Chou, Yung-Shun ;
Wu, Song-Yu ;
Sun, Qin-Dong .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2018, 55 :766-777
[7]   Progressive (k, n) secret image sharing schemes based on Boolean operations and covering codes [J].
Liu, Yan-xiao ;
Yang, Ching-Nung ;
Wu, Song-yu ;
Chou, Yung-shun .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2018, 66 :77-86
[8]   Scalable secret image sharing scheme with essential shadows [J].
Liu, Yanxiao ;
Yang, Chingnung .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2017, 58 :49-55
[9]  
Liu Ying, 2019, MELT ELECTROSPINNING, P1, DOI [10.1016/C2017-0-04642-6, DOI 10.1016/C2017-0-04642-6]
[10]   A machine learning-based scheme for the security analysis of authentication and key agreement protocols [J].
Ma, Zhuo ;
Liu, Yang ;
Wang, Zhuzhu ;
Ge, Haoran ;
Zhao, Meng .
NEURAL COMPUTING & APPLICATIONS, 2020, 32 (22) :16819-16831