A progressively essential secret image sharing scheme using hierarchy shadow

被引:12
作者
Hu, Yan-Xiang [1 ]
Liu, Yi-Ning [1 ]
机构
[1] Guilin Univ Elect Technol, Guangxi Key Lab Trusted Software, Guilin 541004, Peoples R China
基金
中国国家自然科学基金;
关键词
Secret image sharing; Essential; Scalable; Weight;
D O I
10.1016/j.jisa.2019.06.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents an improved (t, s, k, n)-scalable essential secret image sharing based on Lagrange interpolation. In the proposed scheme, an image is shared to n participants in which s are essential. Any set of k or more shadows including a least t essential shadows can obtain the low-quality image, any set of k or more shadows including a least t essential shadows can recover the high-quality image. The more essential shadows to participate in the recovery, the more information of the secret image is obtained. While t = s, the entire secret image can be completely recovered. Even if the essential participants do not cooperate to recovery, k non-essential participants can also collaborate to obtain the low-quality image. Moreover, when an essential shadow is lost or destroyed, only the high-quality image recovery is influenced, meanwhile the low-quality image is still obtained. Compared with the previous similar literatures that some parts of the image cannot be recovered if one of the shadows is accidentally lost or maliciously attacked, our scheme is more suitable for the practical application. (C) 2019 Elsevier Ltd. All rights reserved.
引用
收藏
页码:371 / 376
页数:6
相关论文
共 27 条
[11]   Essential secret image sharing scheme with different importance of shadows [J].
Li, Peng ;
Yang, Ching-Nung ;
Wu, Chih-Cheng ;
Kong, Qian ;
Ma, Yanpeng .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2013, 24 (07) :1106-1114
[12]   Scalable Secret Image Sharing With Smaller Shadow Images [J].
Lin, Yung-Yi ;
Wang, Ran-Zan .
IEEE SIGNAL PROCESSING LETTERS, 2010, 17 (03) :316-319
[13]   Progressive (k, n) secret image sharing Scheme with meaningful shadow images by GEMD and RGEMD [J].
Liu, Yan-Xiao ;
Yang, Ching-Nung ;
Chou, Yung-Shun ;
Wu, Song-Yu ;
Sun, Qin-Dong .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2018, 55 :766-777
[14]   Progressive (k, n) secret image sharing schemes based on Boolean operations and covering codes [J].
Liu, Yan-xiao ;
Yang, Ching-Nung ;
Wu, Song-yu ;
Chou, Yung-shun .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2018, 66 :77-86
[15]   Scalable secret image sharing scheme with essential shadows [J].
Liu, Yanxiao ;
Yang, Chingnung .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2017, 58 :49-55
[16]   Privacy-preserving raw data collection without a trusted authority for IoT [J].
Liu, Yi-Ning ;
Wang, Yan-Ping ;
Wang, Xiao-Fen ;
Xia, Zhe ;
Xu, Jing-Fang .
COMPUTER NETWORKS, 2019, 148 :340-348
[17]   An improved threshold multi-level image recovery scheme [J].
Liu, Yi-Ning ;
Wu, Zhen .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 40 :166-172
[18]   A novel multiple-level secret image sharing scheme [J].
Liu, Yi-Ning ;
Zhong, Qi ;
Xie, Ming ;
Chen, Zu-Bin .
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (05) :6017-6031
[19]   E-voting scheme using secret sharing and K-anonymity [J].
Liu, Yining ;
Zhao, Quanyu .
WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2019, 22 (04) :1657-1667
[20]   Secret image sharing scheme with hierarchical threshold access structure [J].
Pakniat, Nasrollah ;
Noroozi, Mahnaz ;
Eslami, Ziba .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2014, 25 (05) :1093-1101