Threshold changeable secret image sharing scheme based on interpolation polynomial

被引:76
作者
Liu, Yan-Xiao [1 ]
Yang, Ching-Nung [2 ]
Wu, Chi-Ming [2 ]
Sun, Qin-Dong [1 ]
Bi, Wei [3 ]
机构
[1] Xian Univ Technol, Dept Comp Sci & Engn, Xian, Shaanxi, Peoples R China
[2] Natl Dong Hwa Univ, Dept CSIE, Shoufeng Township, Hualien County, Taiwan
[3] SeeleTech Corp, San Francisco, CA USA
关键词
Secret image sharing; Threshold changeable; Interpolation polynomial; BOOLEAN-OPERATIONS;
D O I
10.1007/s11042-019-7205-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In previous (k,n) secret image sharing scheme, the threshold k is decided by dealer according to the security requirement, and this threshold value is fixed without considering the dynamic secure environment in future. In this work, we propose a novel threshold changeable secret image sharing scheme where the threshold value can be changed according to the changeable security requirement. In our scheme, each participant only needs to keep one initial shadow. When reconstructing image, the dealer decides the threshold according to security level. If the threshold is unchanged, any k or more initial shadows can recover the image; else if the threshold is increased or decreased, dealer publishes additional information, each participant update their shadows accordingly such that the threshold of updated shadows is changed correspondingly. The contribution of our work is that the threshold of shadows can be changed flexibly to satisfy the dynamic secure environment, and each participant only need to keep one initial shadows. The feature of threshold changeable makes our scheme more practical than previous secret image sharing in some complicated applications.
引用
收藏
页码:18653 / 18667
页数:15
相关论文
共 27 条
  • [1] Blundo C., 1994, Advances in Cryptology - CRYPTO '93. 13th Annual International Cryptology Conference Proceedings, P110
  • [2] Random-grid based progressive visual secret sharing scheme with adaptive priority
    Chao, Her-Chang
    Fan, Tzuo-Yau
    [J]. DIGITAL SIGNAL PROCESSING, 2017, 68 : 69 - 80
  • [3] SECRET IMAGE SHARING: A BOOLEAN-OPERATIONS-BASED APPROACH COMBINING BENEFITS OF POLYNOMIAL-BASED AND FAST APPROACHES
    Chao, Kun-Yuan
    Lin, Ja-Chen
    [J]. INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2009, 23 (02) : 263 - 285
  • [4] A Zigzag-Decodable Ramp Secret Sharing Scheme
    Gong, Xueqing
    Hu, Ping
    Shum, Kenneth W.
    Sung, Chi Wan
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (08) : 1906 - 1916
  • [5] Dynamic threshold secret reconstruction and its application to the threshold cryptography
    Harn, Lein
    Hsu, Ching-Fang
    [J]. INFORMATION PROCESSING LETTERS, 2015, 115 (11) : 851 - 857
  • [6] Essential secret image sharing scheme with different importance of shadows
    Li, Peng
    Yang, Ching-Nung
    Wu, Chih-Cheng
    Kong, Qian
    Ma, Yanpeng
    [J]. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2013, 24 (07) : 1106 - 1114
  • [7] Progressive (k, n) secret image sharing schemes based on Boolean operations and covering codes
    Liu, Yan-xiao
    Yang, Ching-Nung
    Wu, Song-yu
    Chou, Yung-shun
    [J]. SIGNAL PROCESSING-IMAGE COMMUNICATION, 2018, 66 : 77 - 86
  • [8] Reducing shadow size in smooth scalable secret image sharing
    Liu, Yan-Xiao
    Yang, Ching-Nung
    Yeh, Po-Han
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (12) : 2237 - 2244
  • [9] Scalable secret image sharing scheme with essential shadows
    Liu, Yanxiao
    Yang, Chingnung
    [J]. SIGNAL PROCESSING-IMAGE COMMUNICATION, 2017, 58 : 49 - 55
  • [10] Liu Y, 2015, PROCEEDINGS OF THE TWENTY-FOURTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE (IJCAI), P1617