Ramp secret image sharing

被引:0
作者
Yan, Xuehu [1 ]
Li, Longlong [1 ]
Liu, Lintao [1 ]
Lu, Yuliang [1 ]
Song, Xianhua [2 ]
机构
[1] Natl Univ Def Technol, Hefei 230037, Anhui, Peoples R China
[2] Harbin Univ Sci & Technol, Harbin 150080, Heilongjiang, Peoples R China
基金
中国国家自然科学基金;
关键词
secret image sharing; ramp secret image sharing; Chinese remainder theorem; progressiveness; lossless recovery; GENERAL ACCESS STRUCTURE; VISUAL CRYPTOGRAPHY; CONSTRUCTION; SCHEME; LOSSLESS; QUALITY; MATRIX;
D O I
10.3934/mbe.2019221
中图分类号
Q [生物科学];
学科分类号
07 ; 0710 ; 09 ;
摘要
Secret image sharing (SIS) belongs to but differs from secret sharing. In general, conventional (k, n) threshold SIS has the shortcoming of "all-or-nothing". In this article, first we introduce ramp SIS definition. Then we propose a (k(1), k(2), n) ramp SIS based on the Chinese remainder theorem (CRT). In the proposed scheme, on the one hand, when we collect any k(1) or more and less than k(2) shadows, the secret image will be disclosed in a progressive way. On the other hand, when we collect any k(2) or more shadows, the secret image will be disclosed losslessly. Furthermore, the disclosing method is only modular arithmetic, which can be used in some real-time applications. We give theoretical analyses and experiments to show the effectiveness of the proposed scheme.
引用
收藏
页码:4433 / 4455
页数:23
相关论文
共 52 条
[1]  
[Anonymous], 1994, WORKSHOP THEORY APPL, DOI 10.1007/BFb0053419
[2]  
[Anonymous], 1984, P CRYPTO, DOI DOI 10.1007/3-540-39568-7_20
[3]   A MODULAR APPROACH TO KEY SAFEGUARDING [J].
ASMUTH, C ;
BLOOM, J .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :208-210
[4]   Combination of Sharing Matrix and Image Encryption for Lossless (k, n)-Secret Image Sharing [J].
Bao, Long ;
Yi, Shuang ;
Zhou, Yicong .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2017, 26 (12) :5618-5631
[5]   A simple yet efficient S-box method based on chaotic sine map [J].
Belazi, Akram ;
Abd El-Latif, Ahmed A. .
OPTIK, 2017, 130 :1438-1444
[6]   Generating random grid-based visual secret sharing with multi-level encoding [J].
Chao, Her Chang ;
Fan, Tzuo Yau .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2017, 57 :60-67
[7]   A note on ramp secret sharing schemes from error-correcting codes [J].
Chen, Qi ;
Pei, Dingyi ;
Tang, Chunming ;
Yue, Qiang ;
Ji, Tongkai .
MATHEMATICAL AND COMPUTER MODELLING, 2013, 57 (11-12) :2695-2702
[8]   Friendly progressive visual secret sharing using generalized random grids [J].
Chen, Shang-Kuan .
OPTICAL ENGINEERING, 2009, 48 (11)
[9]   Improved Visual Secret Sharing Scheme for QR Code Applications [J].
Cheng, Yuqiao ;
Fu, Zhengxin ;
Yu, Bin .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (09) :2393-2403
[10]   A General (k, n) Threshold Secret Image Sharing Construction Based on Matrix Theory [J].
Ding, Wanmeng ;
Liu, Kesheng ;
Yan, Xuehu ;
Liu, Lintao .
DATA SCIENCE, PT 1, 2017, 727 :331-340