Secret image sharing with smaller shadow sizes for general access structures

被引:0
作者
Ying-Ru Chen
Ling-Hwei Chen
Shyong Jian Shyu
机构
[1] National Chiao Tung University,Institute of Computer Science and Engineering
[2] National Chiao Tung University,Department of Computer Science
[3] Ming Chuan University,Department of Computer Science and Information Engineering
来源
Multimedia Tools and Applications | 2016年 / 75卷
关键词
Shadow size; Secret image sharing; General access structure;
D O I
暂无
中图分类号
学科分类号
摘要
In the area of secret image sharing (SIS), most papers focused on the schemes for threshold or some special access structures. Regarding general access structures (GAS), few results have been found in the literature. Two SIS schemes for GAS were proposed in 2001 and 2010, both are based on qualified sets. However, one distorts the reconstructed secret image, and some extra information is needed in both schemes. Here, we propose three polynomial based SIS schemes for GAS. Considering either qualified or forbidden sets, these schemes can reconstruct the secret image perfectly without any extra information needed. Some proof and analysis on the shadow sizes of the three schemes are given to lead us to choose the one with the smallest size. In addition, we also give some comparisons with two existing schemes, and security issue is also addressed in conclusion.
引用
收藏
页码:13913 / 13929
页数:16
相关论文
共 50 条
[41]   Secret Image Sharing Safety [J].
Fang, Wen-Pinn .
2008 14TH ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS, (APCC), VOLS 1 AND 2, 2008, :77-80
[42]   Affine Boolean classification in secret image sharing for progressive quality access control [J].
Bhattacharjee, Tapasi ;
Rout, Ranjeet Kumar ;
Maity, Santi P. .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 33 :16-29
[43]   SE-SIS: SHADOW-EMBEDDABLE LOSSLESS SECRET IMAGE SHARING FOR GREYSCALE IMAGES [J].
Xu, Zikai ;
Bin Liu ;
Hu, Fei ;
Li, Weihai ;
Yu, Nenghai .
2024 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING, ICASSP 2024, 2024, :4775-4779
[44]   A general (k, n) scalable secret image sharing scheme with the smooth scalability [J].
Yang, Ching-Nung ;
Chu, Yu-Ying .
JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (10) :1726-1733
[45]   Computationally Secure Cheating Identifiable Multi-Secret Sharing for General Access Structure [J].
Roy, Partha Sarathi ;
Das, Angsuman ;
Adhikari, Avishek .
DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, ICDCIT 2015, 2015, 8956 :278-287
[46]   Scalable secret image sharing scheme with essential shadows [J].
Liu, Yanxiao ;
Yang, Chingnung .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2017, 58 :49-55
[47]   General secret sharing based on determinants [J].
Iftene, S .
SEVENTH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING, PROCEEDINGS, 2005, :154-157
[48]   Extending boolean operations-based secret image sharing to compartmented access structure [J].
Sachin Kumar .
Multimedia Tools and Applications, 2023, 82 :22063-22082
[49]   Extending boolean operations-based secret image sharing to compartmented access structure [J].
Kumar, Sachin .
MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (14) :22063-22082
[50]   Pixel co-ordinate-based secret image sharing scheme with constant size shadow images [J].
Patil, Shravani Mahesh ;
Purushothama, B. R. .
COMPUTERS & ELECTRICAL ENGINEERING, 2021, 89