Ramp secret image sharing

被引:0
作者
Yan, Xuehu [1 ]
Li, Longlong [1 ]
Liu, Lintao [1 ]
Lu, Yuliang [1 ]
Song, Xianhua [2 ]
机构
[1] Natl Univ Def Technol, Hefei 230037, Anhui, Peoples R China
[2] Harbin Univ Sci & Technol, Harbin 150080, Heilongjiang, Peoples R China
基金
中国国家自然科学基金;
关键词
secret image sharing; ramp secret image sharing; Chinese remainder theorem; progressiveness; lossless recovery; GENERAL ACCESS STRUCTURE; VISUAL CRYPTOGRAPHY; CONSTRUCTION; SCHEME; LOSSLESS; QUALITY; MATRIX;
D O I
10.3934/mbe.2019221
中图分类号
Q [生物科学];
学科分类号
07 ; 0710 ; 09 ;
摘要
Secret image sharing (SIS) belongs to but differs from secret sharing. In general, conventional (k, n) threshold SIS has the shortcoming of "all-or-nothing". In this article, first we introduce ramp SIS definition. Then we propose a (k(1), k(2), n) ramp SIS based on the Chinese remainder theorem (CRT). In the proposed scheme, on the one hand, when we collect any k(1) or more and less than k(2) shadows, the secret image will be disclosed in a progressive way. On the other hand, when we collect any k(2) or more shadows, the secret image will be disclosed losslessly. Furthermore, the disclosing method is only modular arithmetic, which can be used in some real-time applications. We give theoretical analyses and experiments to show the effectiveness of the proposed scheme.
引用
收藏
页码:4433 / 4455
页数:23
相关论文
共 52 条
[21]   Embedded Extended Visual Cryptography Schemes [J].
Liu, Feng ;
Wu, Chuankun .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (02) :307-322
[22]  
Liu L, 2016, INT CONF SIGN PROCES, P389, DOI 10.1109/ICSP.2016.7877861
[23]   Cheating identifiable secret sharing scheme using symmetric bivariate polynomial [J].
Liu, Yanxiao ;
Yang, Chingnung ;
Wang, Yichuan ;
Zhu, Lei ;
Ji, Wenjiang .
INFORMATION SCIENCES, 2018, 453 :21-29
[24]   Scalable secret image sharing scheme with essential shadows [J].
Liu, Yanxiao ;
Yang, Chingnung .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2017, 58 :49-55
[25]   Selection of Rich Model Steganalysis Features Based on Decision Rough Set α-Positive Region Reduction [J].
Ma, Yuanyuan ;
Luo, Xiangyang ;
Li, Xiaolong ;
Bao, Zhenkun ;
Zhang, Yi .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2019, 29 (02) :336-350
[26]   New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams [J].
Qian, Zhenxing ;
Xu, Haisheng ;
Luo, Xiangyang ;
Zhang, Xinpeng .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2019, 29 (02) :351-362
[27]   Cheating prevention visual cryptography scheme using Latin square [J].
Ren, Yawei ;
Liu, Feng ;
Guo, Teng ;
Feng, Rongquan ;
Lin, Dongdai .
IET INFORMATION SECURITY, 2017, 11 (04) :211-219
[28]   Visual Secret Sharing Schemes Encrypting Multiple Images [J].
Sasaki, Manami ;
Watanabe, Yodai .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (02) :356-365
[29]   HOW TO SHARE A SECRET [J].
SHAMIR, A .
COMMUNICATIONS OF THE ACM, 1979, 22 (11) :612-613
[30]  
Teng Guo, 2018, Procedia Computer Science, V131, P336, DOI 10.1016/j.procs.2018.04.172