Greyscale-images-oriented progressive secret sharing based on the linear congruence equation

被引:11
作者
Liu, Lintao [1 ]
Lu, Yuliang [1 ]
Yan, Xuehu [1 ]
Wang, Huaixi [1 ]
机构
[1] Natl Univ Def Technol, Hefei 230037, Anhui, Peoples R China
基金
中国国家自然科学基金;
关键词
Secret sharing; Progressive secret sharing; Greyscale image; Linear congruence; Simple computations; THRESHOLD VISUAL CRYPTOGRAPHY; STEGANOGRAPHY; IMPROVEMENTS; SCHEMES;
D O I
10.1007/s11042-017-5435-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secret image sharing (SIS) can be applied to protect a secret image when the secret is transmitted in public channels. However, classic SIS schemes, e.g., visual secret sharing (VSS) and Shamir's polynomial-based scheme, are not suitable for progressive encryption of greyscale images, because they will lead to many problems, such as "All-orNothing", lossy recovery, complex computations and so on. Based on the linear congruence equation, three novel progressive secret sharing (PSS) schemes are proposed to overcome these problems: (k, k) threshold LCSS and (k, n) threshold LCPSS aim to achieve general threshold progressive secret sharing with simple computations. Furthermore, extended LCPSS (ELCPSS) is developed to generate meaningful shadow images, which enable simple management and misleading the enemy. Both theoretical proofs and experimental results are given to demonstrate the validity of the proposed scheme.
引用
收藏
页码:20569 / 20596
页数:28
相关论文
共 39 条
[1]   Visual cryptography for general access structures [J].
Ateniese, G ;
Blundo, C ;
DeSantis, A ;
Stinson, DR .
INFORMATION AND COMPUTATION, 1996, 129 (02) :86-106
[2]  
Blakley GR, 1979, P NAT COMP C, P313, DOI 10.1109/MARK.1979.8817296
[3]   Sharing secrets in stego images with authentication [J].
Chang, Chin-Chen ;
Hsieh, Yi-Pei ;
Lin, Chia-Hsuan .
PATTERN RECOGNITION, 2008, 41 (10) :3130-3137
[4]   Friendly progressive visual secret sharing using generalized random grids [J].
Chen, Shang-Kuan .
OPTICAL ENGINEERING, 2009, 48 (11)
[5]   Fault-tolerant and progressive transmission of images [J].
Chen, SK ;
Lin, JC .
PATTERN RECOGNITION, 2005, 38 (12) :2466-2471
[6]   Secret sharing: using meaningful image shadows based on Gray code [J].
Cheng, Ting-Fang ;
Chang, Ching-Chun ;
Liu, Li .
MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (07) :9337-9362
[7]  
Chih-Ching Thien, 2002, Computers & Graphics, V26, P765, DOI 10.1016/S0097-8493(02)00131-0
[8]   Optimal colored threshold visual cryptography schemes [J].
Cimato, S ;
De Prisco, R ;
De Santis, A .
DESIGNS CODES AND CRYPTOGRAPHY, 2005, 35 (03) :311-335
[9]  
Fang WP, 2014, NON EXPANDING FRIEND, P155
[10]   Threshold visual secret sharing by random grids with improved contrast [J].
Guo, Teng ;
Liu, Feng ;
Wu, ChuanKun .
JOURNAL OF SYSTEMS AND SOFTWARE, 2013, 86 (08) :2094-2109