A novel (n, t, n) secret image sharing scheme without a trusted third party

被引:7
|
作者
Guo, Cheng [1 ]
Chang, Chin-Chen [2 ,3 ]
Qin, Chuan [2 ]
机构
[1] Dalian Univ Technol, Sch Software, Dalian 116620, Peoples R China
[2] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
[3] Chinese Med Univ, Dept Biomed Imaging & Radiol Sci, Taichung 40402, Taiwan
关键词
(n; t; n) secret sharing; Modulo operator; Additive homomorphism; Secret image sharing; Trusted third party; SMALLER SHADOW IMAGES; CELLULAR-AUTOMATA; STEGANOGRAPHY; AUTHENTICATION;
D O I
10.1007/s11042-013-1510-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secret image sharing is a technique to share a secret image among a set of n participants. A trusted third party embeds the secret image into the cover image to generate shadow images such that at least t or more shadow images can reconstruct the secret image. In this paper, we consider an extreme and real-world situation, in which there is no one who is trusted by anyone else. In the proposed scheme, the participants can act as a dealer and communicate with each other in a secret channel. Each participant can generate her/his own shadow image independently, according to the cover image and the secret image. Experimental results are provided to show that the shadow images have satisfactory quality. In addition, our scheme has a large embedding capacity, and the secret image can be reconstructed losslessly.
引用
收藏
页码:2195 / 2209
页数:15
相关论文
共 50 条
  • [21] A Verifiable (n, n) Secret Image Sharing Scheme Using XOR Operations
    Chattopadhyay, Arup Kumar
    Ghosh, Debalina
    Maitra, Paramita
    Nag, Amitava
    Saha, Himadri Nath
    2018 9TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2018, : 1025 - 1031
  • [22] An efficient verifiable (t,n)-threshold secret image sharing scheme with ultralight shares
    Chattopadhyay, Arup Kumar
    Nag, Amitava
    Singh, Jyoti Prakash
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (24) : 34969 - 34999
  • [23] An efficient verifiable (t,n)-threshold secret image sharing scheme with ultralight shares
    Arup Kumar Chattopadhyay
    Amitava Nag
    Jyoti Prakash Singh
    Multimedia Tools and Applications, 2022, 81 : 34969 - 34999
  • [24] An efficient (t, n) threshold quantum secret sharing without entanglement
    Qin, Huawang
    Dai, Yuewei
    MODERN PHYSICS LETTERS B, 2016, 30 (12):
  • [25] A general (k, n) scalable secret image sharing scheme with the smooth scalability
    Yang, Ching-Nung
    Chu, Yu-Ying
    JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (10) : 1726 - 1733
  • [26] K Out of N Secret Sharing Scheme with Steganography and Authentication
    Fathimal, P. Mohamed
    Rani, P. Arockia Jansi
    COMPUTATIONAL INTELLIGENCE, CYBER SECURITY AND COMPUTATIONAL MODELS, ICC3 2015, 2016, 412 : 413 - 425
  • [27] A (t,n)- Secret image sharing with steganography based on Rook polynomial and LWE problem
    Mashhadi, Samaneh
    Saeedi, Zahra
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (25) : 39077 - 39097
  • [28] A novel weighted threshold secret image sharing scheme
    Li, Mingchu
    Ma, Shu
    Guo, Cheng
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3083 - 3093
  • [29] Meaningful (2, i n f i n i t y) secret image sharing scheme based on flipping operations
    Ou, Duanhao
    Sun, Wei
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (06) : 3517 - 3536
  • [30] (k,n) secret image sharing scheme capable of cheating detection
    Yan-Xiao Liu
    Qin-Dong Sun
    Ching-Nung Yang
    EURASIP Journal on Wireless Communications and Networking, 2018