Secret image sharing with smaller shadow sizes for general access structures

被引:0
作者
Ying-Ru Chen
Ling-Hwei Chen
Shyong Jian Shyu
机构
[1] National Chiao Tung University,Institute of Computer Science and Engineering
[2] National Chiao Tung University,Department of Computer Science
[3] Ming Chuan University,Department of Computer Science and Information Engineering
来源
Multimedia Tools and Applications | 2016年 / 75卷
关键词
Shadow size; Secret image sharing; General access structure;
D O I
暂无
中图分类号
学科分类号
摘要
In the area of secret image sharing (SIS), most papers focused on the schemes for threshold or some special access structures. Regarding general access structures (GAS), few results have been found in the literature. Two SIS schemes for GAS were proposed in 2001 and 2010, both are based on qualified sets. However, one distorts the reconstructed secret image, and some extra information is needed in both schemes. Here, we propose three polynomial based SIS schemes for GAS. Considering either qualified or forbidden sets, these schemes can reconstruct the secret image perfectly without any extra information needed. Some proof and analysis on the shadow sizes of the three schemes are given to lead us to choose the one with the smallest size. In addition, we also give some comparisons with two existing schemes, and security issue is also addressed in conclusion.
引用
收藏
页码:13913 / 13929
页数:16
相关论文
共 50 条
[31]   A new lossless secret color image sharing scheme with small shadow size [J].
Sardar M.K. ;
Adhikari A. .
Journal of Visual Communication and Image Representation, 2020, 68
[32]   Relations Between Secret Sharing and Secret Image Sharing [J].
Yan, Xuehu ;
Li, Jinming ;
Lu, Yuliang ;
Liu, Lintao ;
Yang, Guozheng ;
Chen, Huixian .
SECURITY WITH INTELLIGENT COMPUTING AND BIG-DATA SERVICES, 2020, 895 :79-93
[33]   A Universal Secret Sharing Scheme with General Access Structure Based on CRT [J].
Meng, Keju ;
Miao, Fuyou ;
Yu, Yue ;
Lu, Changbin .
2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, :142-148
[34]   Progressive visual secret sharing for general access structure with multiple decryptions [J].
Xuehu Yan ;
Yuliang Lu .
Multimedia Tools and Applications, 2018, 77 :2653-2672
[35]   Progressive visual secret sharing for general access structure with multiple decryptions [J].
Yan, Xuehu ;
Lu, Yuliang .
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (02) :2653-2672
[36]   Progressive visual secret sharing for general access structure with multiple decryptions [J].
Yan, Xuehu ;
Lu, Yuliang ;
Liu, Lintao ;
Wan, Song ;
Ding, Wanmeng ;
Liu, Hanlin .
2016 8TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY IN MEDICINE AND EDUCATION (ITME), 2016, :668-673
[37]   A distortion free multi-secret image sharing with efficient shadow communication overhead [J].
Yadav, Mainejar ;
Ranvijay .
JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2018, 39 (01) :143-156
[38]   Computationally Secure Robust Multi-secret Sharing for General Access Structure [J].
Das, Angsuman ;
Roy, Partha Sarathi ;
Adhikari, Avishek .
MATHEMATICS AND COMPUTING, 2015, 139 :123-134
[39]   Renewal of secret and shadows in secret image sharing [J].
Yu, Yongqiang ;
Yan, Xuehu ;
Li, Longlong ;
Wang, Jiayu .
IET INFORMATION SECURITY, 2022, 16 (06) :432-441
[40]   Secret Image Sharing Schemes: A Comprehensive Survey [J].
Saha, Sanchita ;
Chattopadhyay, Arup Kumar ;
Barman, Anup Kumar ;
Nag, Amitava ;
Nandi, Sukumar .
IEEE ACCESS, 2023, 11 :98333-98361