A novel (n, t, n) secret image sharing scheme without a trusted third party

被引:7
作者
Guo, Cheng [1 ]
Chang, Chin-Chen [2 ,3 ]
Qin, Chuan [2 ]
机构
[1] Dalian Univ Technol, Sch Software, Dalian 116620, Peoples R China
[2] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
[3] Chinese Med Univ, Dept Biomed Imaging & Radiol Sci, Taichung 40402, Taiwan
关键词
(n; t; n) secret sharing; Modulo operator; Additive homomorphism; Secret image sharing; Trusted third party; SMALLER SHADOW IMAGES; CELLULAR-AUTOMATA; STEGANOGRAPHY; AUTHENTICATION;
D O I
10.1007/s11042-013-1510-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secret image sharing is a technique to share a secret image among a set of n participants. A trusted third party embeds the secret image into the cover image to generate shadow images such that at least t or more shadow images can reconstruct the secret image. In this paper, we consider an extreme and real-world situation, in which there is no one who is trusted by anyone else. In the proposed scheme, the participants can act as a dealer and communicate with each other in a secret channel. Each participant can generate her/his own shadow image independently, according to the cover image and the secret image. Experimental results are provided to show that the shadow images have satisfactory quality. In addition, our scheme has a large embedding capacity, and the secret image can be reconstructed losslessly.
引用
收藏
页码:2195 / 2209
页数:15
相关论文
共 25 条
[1]  
[Anonymous], 1979, P AFIPS NAT COMP C N
[2]   Sharing a verifiable secret image using two shadows [J].
Chang, Chin-Chen ;
Lin, Chia-Chen ;
Le, T. Hoang Ngan ;
Le, Hoai Bac .
PATTERN RECOGNITION, 2009, 42 (11) :3097-3114
[3]   Secret image sharing with authentication-chaining and dynamic embedding [J].
Eslami, Z. ;
Ahmadabadi, J. Zarepour .
JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (05) :803-809
[4]   Secret image sharing based on cellular automata and steganography [J].
Eslami, Z. ;
Razzaghi, S. H. ;
Ahmadabadi, J. Zarepour .
PATTERN RECOGNITION, 2010, 43 (01) :397-404
[5]   A multi-threshold secret image sharing scheme based on MSP [J].
Guo, Cheng ;
Chang, Chin-Chen ;
Qin, Chuan .
PATTERN RECOGNITION LETTERS, 2012, 33 (12) :1594-1600
[6]   A hierarchical threshold secret image sharing [J].
Guo, Cheng ;
Chang, Chin-Chen ;
Qin, Chuan .
PATTERN RECOGNITION LETTERS, 2012, 33 (01) :83-91
[7]   EFFICIENT SHARING (BROADCASTING) OF MULTIPLE SECRETS [J].
HARN, L .
IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1995, 142 (03) :237-240
[8]   Strong (n,t,n) verifiable secret sharing scheme [J].
Harn, Lein ;
Lin, Changlu .
INFORMATION SCIENCES, 2010, 180 (16) :3059-3064
[9]   An on-line secret sharing scheme for multi-secrets [J].
Hwang, RJ ;
Chang, CC .
COMPUTER COMMUNICATIONS, 1998, 21 (13) :1170-1176
[10]  
INGEMARSSON I, 1991, LECT NOTES COMPUT SC, V473, P266