A novel (n, t, n) secret image sharing scheme without a trusted third party

被引:7
|
作者
Guo, Cheng [1 ]
Chang, Chin-Chen [2 ,3 ]
Qin, Chuan [2 ]
机构
[1] Dalian Univ Technol, Sch Software, Dalian 116620, Peoples R China
[2] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
[3] Chinese Med Univ, Dept Biomed Imaging & Radiol Sci, Taichung 40402, Taiwan
关键词
(n; t; n) secret sharing; Modulo operator; Additive homomorphism; Secret image sharing; Trusted third party; SMALLER SHADOW IMAGES; CELLULAR-AUTOMATA; STEGANOGRAPHY; AUTHENTICATION;
D O I
10.1007/s11042-013-1510-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secret image sharing is a technique to share a secret image among a set of n participants. A trusted third party embeds the secret image into the cover image to generate shadow images such that at least t or more shadow images can reconstruct the secret image. In this paper, we consider an extreme and real-world situation, in which there is no one who is trusted by anyone else. In the proposed scheme, the participants can act as a dealer and communicate with each other in a secret channel. Each participant can generate her/his own shadow image independently, according to the cover image and the secret image. Experimental results are provided to show that the shadow images have satisfactory quality. In addition, our scheme has a large embedding capacity, and the secret image can be reconstructed losslessly.
引用
收藏
页码:2195 / 2209
页数:15
相关论文
共 50 条
  • [41] A (t,n)- Secret image sharing with steganography based on Rook polynomial and LWE problem
    Samaneh Mashhadi
    Zahra Saeedi
    Multimedia Tools and Applications, 2023, 82 : 39077 - 39097
  • [42] New Condition for Hierarchical Secret Image Sharing Scheme
    Espejel-Trujillo, Angelina
    Nakano-Miyatake, Mariko
    Perez-Meana, Hector
    2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2014, : 240 - 244
  • [43] Scalable secret image sharing scheme with essential shadows
    Liu, Yanxiao
    Yang, Chingnung
    SIGNAL PROCESSING-IMAGE COMMUNICATION, 2017, 58 : 49 - 55
  • [44] Enhanced Boolean-based multi secret image sharing scheme
    Yang, Ching-Nung
    Chen, Cheng-Hua
    Cai, Song-Ruei
    JOURNAL OF SYSTEMS AND SOFTWARE, 2016, 116 : 22 - 34
  • [45] Novel quantum secret image-sharing scheme
    罗高峰
    周日贵
    胡文文
    Chinese Physics B, 2019, (04) : 65 - 73
  • [46] Novel quantum secret image-sharing scheme
    Luo, Gao-Feng
    Zhou, Ri-Gui
    Hu, Wen-Wen
    CHINESE PHYSICS B, 2019, 28 (04)
  • [47] A novel image protection scheme using bit-plane compression and secret sharing
    Liu, Yining
    Zhong, Qi
    Shen, Jian
    Chang, Chin-Chen
    JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2017, 40 (02) : 161 - 169
  • [48] A Novel General (n, n)-Threshold Multiple Secret Images Sharing Scheme Based on Information Hiding in the Sharing Domain
    Xing, Fengyue
    Yan, Xuehu
    Yu, Long
    Li, Longlong
    ENTROPY, 2022, 24 (03)
  • [49] Partial Secret Image Sharing for (n, n) Threshold Based on Image Inpainting
    Yan, Xuehu
    Lu, Yuliang
    Liu, Lintao
    Wang, Shen
    Wan, Song
    Ding, Wanmeng
    Liu, Hanlin
    IMAGE AND GRAPHICS (ICIG 2017), PT III, 2017, 10668 : 527 - 538
  • [50] Cryptanalysis of secret-sharing multi-signature scheme without trusted centre
    State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
    Huanan Ligong Daxue Xuebao, 2008, 9 (52-54):