A construction method of (t, k, n)-essential secret image sharing scheme

被引:50
作者
Li, Peng [1 ]
Liu, Zuquan [1 ]
Yang, Ching-Nung [2 ]
机构
[1] North China Elect Power Univ, Dept Math & Phys, Baoding, Hebei, Peoples R China
[2] Natl Dong Hwa Univ, Dept CSIE, Hualien, Taiwan
基金
中国国家自然科学基金;
关键词
Secret image sharing; Secret sharing; Essential shadows; Lagrange interpolation; VISUAL CRYPTOGRAPHY; AUTHENTICATION; STEGANOGRAPHY; SHADOWS; SIZE;
D O I
10.1016/j.image.2018.04.002
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Secret image sharing (SIS) is a technique to decompose a secret image into multiple shadows distributed to the corresponding participants. Only qualified subsets of the shadows can reveal the secret image. Usually all shadows have the same importance. However, in some application scenario, some shadows are accorded with the special privilege due to the status or importance of the corresponding participants. A (t, k, n) essential secret image sharing (ESIS) scheme share a secret image into n shadows including t essential shadows and n-t non-essential shadows. A qualified subset of the shadows should contain at least k shadows including all t essential shadows. In this paper, we propose a construction method of (t, k, n) essential secret image sharing (ESIS) scheme. In our scheme, all shadows have the size 1/k times of the secret image. It also resolves the problems in the previous ESIS schemes, such as different shadow sizes, concatenation of sub-shadows, using multiple SIS schemes and so on. Theoretical analyses and experimental results show that the proposed scheme is secure and effective.
引用
收藏
页码:210 / 220
页数:11
相关论文
共 31 条
[1]  
Blakley G. R., 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK), P313, DOI 10.1109/MARK.1979.8817296
[2]   A scheme for threshold multi-secret sharing [J].
Chan, CW ;
Chang, CC .
APPLIED MATHEMATICS AND COMPUTATION, 2005, 166 (01) :1-14
[3]  
Chen Ch-Ch., 2016, J INF HIDING MULTIME, V7, P135
[4]   A new Boolean-based multiple secret image sharing scheme to share different sized secret images [J].
Chen, Chien-Chang ;
Chen, Jun-Long .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 33 :45-54
[5]   Two-layered structure for optimally essential secret image sharing scheme [J].
Chen, Chien-Chang ;
Chen, Shih-Chang .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2016, 38 :595-601
[6]   Tamper-proof secret image-sharing scheme for identifying cheated secret keys and shared images [J].
Chen, Chien-Chang ;
Liu, Chong-An .
JOURNAL OF ELECTRONIC IMAGING, 2013, 22 (01)
[7]   Weighted modulated secret image sharing method [J].
Chen, Chien-Chang ;
Chen, Chaur-Chin ;
Lin, Yun-Cheng .
JOURNAL OF ELECTRONIC IMAGING, 2009, 18 (04)
[8]   Essential secret image sharing with increasable shadows [J].
Chen, Shang-Kuan .
OPTICAL ENGINEERING, 2016, 55 (01)
[9]   (t, n) Threshold secret image sharing scheme with adversary structure [J].
Guo, Cheng ;
Yuan, Qiongqiong ;
Lu, Kun ;
Li, Mingchu ;
Fu, Zhangjie .
MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (20) :21193-21210
[10]   A multi-threshold secret image sharing scheme based on the generalized Chinese reminder theorem [J].
Guo, Cheng ;
Zhang, Huan ;
Song, Qiongqiong ;
Li, Mingchu .
MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (18) :11577-11594