Two-layered structure for optimally essential secret image sharing scheme

被引:26
作者
Chen, Chien-Chang [1 ]
Chen, Shih-Chang [1 ]
机构
[1] Tamkang Univ, Dept Comp Sci & Informat Engn, 151 Yingzhuan Rd, New Taipei 25137, Taiwan
关键词
Secret image sharing; Essential; Non-essential; Two-layered structure; Optimal sharing ratios; AUTHENTICATION;
D O I
10.1016/j.jvcir.2016.04.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a two-layered structure for optimally sharing a secret image among s essential and n - s non-essential shared shadows using the (t,s,k,n) essential thresholds, that t essential shared shadows and totally k shared shadows are needed to recover the secret image. The presented two-layered structure includes one user-defined parameter in to determine different kinds of optimal results. m =1 leads to minimum size of total shared shadows (ST) and size of an essential shared shadow is close to size of a non-essential shared shadow. On the other hand, m = t leads to size of an essential shared shadow being twice of size of a non-essential shared shadow to signify the importance of an essential shared shadow. Moreover, the proposed structure overcomes the threshold fulfillment problem in Chen's scheme (Chen, 2016). Theoretical analyses and experimental results show that the proposed scheme exhibits secure with optimal sharing ratios among related works. (C) 2016 Elsevier Inc. All rights reserved.
引用
收藏
页码:595 / 601
页数:7
相关论文
共 23 条
[1]   Meaningful secret sharing technique with authentication and remedy abilities [J].
Chang, Chin-Chen ;
Chen, Yi-Hui ;
Wang, Hsin-Chi .
INFORMATION SCIENCES, 2011, 181 (14) :3073-3084
[2]   A secure Boolean-based multi-secret image sharing scheme [J].
Chen, Chien-Chang ;
Wu, Wei-Jie .
JOURNAL OF SYSTEMS AND SOFTWARE, 2014, 92 :107-114
[3]   Tamper-proof secret image-sharing scheme for identifying cheated secret keys and shared images [J].
Chen, Chien-Chang ;
Liu, Chong-An .
JOURNAL OF ELECTRONIC IMAGING, 2013, 22 (01)
[4]   Essential secret image sharing with increasable shadows [J].
Chen, Shang-Kuan .
OPTICAL ENGINEERING, 2016, 55 (01)
[5]   Efficient multi-secret image sharing based on Boolean operations [J].
Chen, Tzung-Her ;
Wu, Chang-Sian .
SIGNAL PROCESSING, 2011, 91 (01) :90-97
[6]   A verifiable multi-secret sharing scheme based on cellular automata [J].
Eslami, Z. ;
Ahmadabadi, J. Zarepour .
INFORMATION SCIENCES, 2010, 180 (15) :2889-2894
[7]   A hierarchical threshold secret image sharing [J].
Guo, Cheng ;
Chang, Chin-Chen ;
Qin, Chuan .
PATTERN RECOGNITION LETTERS, 2012, 33 (01) :83-91
[8]   A high quality and small shadow size visual secret sharing scheme based on hybrid strategy for grayscale images [J].
Le, T. Hoang Ngan ;
Lin, Chia-Chen ;
Chang, Chin-Chen ;
Hoai Bac Le .
DIGITAL SIGNAL PROCESSING, 2011, 21 (06) :734-745
[9]   Essential secret image sharing scheme with different importance of shadows [J].
Li, Peng ;
Yang, Ching-Nung ;
Wu, Chih-Cheng ;
Kong, Qian ;
Ma, Yanpeng .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2013, 24 (07) :1106-1114
[10]   Invertible secret image sharing with steganography [J].
Lin, Pei-Yu ;
Chan, Chi-Shiang .
PATTERN RECOGNITION LETTERS, 2010, 31 (13) :1887-1893