A novel (n, t, n) secret image sharing scheme without a trusted third party

被引:7
|
作者
Guo, Cheng [1 ]
Chang, Chin-Chen [2 ,3 ]
Qin, Chuan [2 ]
机构
[1] Dalian Univ Technol, Sch Software, Dalian 116620, Peoples R China
[2] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
[3] Chinese Med Univ, Dept Biomed Imaging & Radiol Sci, Taichung 40402, Taiwan
关键词
(n; t; n) secret sharing; Modulo operator; Additive homomorphism; Secret image sharing; Trusted third party; SMALLER SHADOW IMAGES; CELLULAR-AUTOMATA; STEGANOGRAPHY; AUTHENTICATION;
D O I
10.1007/s11042-013-1510-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secret image sharing is a technique to share a secret image among a set of n participants. A trusted third party embeds the secret image into the cover image to generate shadow images such that at least t or more shadow images can reconstruct the secret image. In this paper, we consider an extreme and real-world situation, in which there is no one who is trusted by anyone else. In the proposed scheme, the participants can act as a dealer and communicate with each other in a secret channel. Each participant can generate her/his own shadow image independently, according to the cover image and the secret image. Experimental results are provided to show that the shadow images have satisfactory quality. In addition, our scheme has a large embedding capacity, and the secret image can be reconstructed losslessly.
引用
收藏
页码:2195 / 2209
页数:15
相关论文
共 50 条
  • [1] A novel (n, t, n) secret image sharing scheme without a trusted third party
    Cheng Guo
    Chin-Chen Chang
    Chuan Qin
    Multimedia Tools and Applications, 2014, 72 : 2195 - 2209
  • [2] (t, n) Threshold secret image sharing scheme with adversary structure
    Guo, Cheng
    Yuan, Qiongqiong
    Lu, Kun
    Li, Mingchu
    Fu, Zhangjie
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (20) : 21193 - 21210
  • [3] A Novel Image Secret Sharing Scheme without Third-Party Scrambling Method
    Hu, Weitong
    Yao, Ye
    Zhou, Di
    Zheng, Qiuhua
    Choo, Kim-Kwang Raymond
    MOBILE NETWORKS & APPLICATIONS, 2019, 24 (04) : 1317 - 1335
  • [4] A Novel Image Secret Sharing Scheme without Third-Party Scrambling Method
    Weitong Hu
    Ye Yao
    Di Zhou
    Qiuhua Zheng
    Kim-Kwang Raymond Choo
    Mobile Networks and Applications, 2019, 24 : 1317 - 1335
  • [5] A Novel(n,n)Secret Image Sharing Scheme Based on Sudoku
    Zhi-Hui Wang
    Cheng Guo
    Chin-Chen Chang
    JournalofElectronicScienceandTechnology, 2013, 11 (01) : 44 - 50
  • [6] A new (t, n) threshold image hiding scheme for sharing a secret color image
    Chang, CC
    Lin, IC
    2003 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOL 1 AND 2, PROCEEDINGS, 2003, : 196 - 202
  • [7] A scheme for (t, n) threshold secret image sharing
    Chan, Chao-Wen
    Chang, Thin-Chen
    IMECS 2006: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, 2006, : 619 - +
  • [8] A construction method of (t, k, n)-essential secret image sharing scheme
    Li, Peng
    Liu, Zuquan
    Yang, Ching-Nung
    SIGNAL PROCESSING-IMAGE COMMUNICATION, 2018, 65 : 210 - 220
  • [9] Secret Image Sharing Using (t,n) Threshold Scheme with Lossless Recovery
    Chien, Ming-Chun
    Hwang, Jen-Ing G.
    2012 5TH INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING (CISP), 2012, : 1325 - 1329
  • [10] A Novel (2,n) Secret Image Sharing Scheme
    Bhattacharjee, Tapasi
    Singh, Jyoti Prakash
    Nag, Amitava
    2ND INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION, CONTROL AND INFORMATION TECHNOLOGY (C3IT-2012), 2012, 4 : 619 - 623