Polynomial-Based Secret Sharing Scheme for Text, Image and Audio

被引:1
作者
Guttikonda P. [1 ,2 ]
Mundukur N.B. [1 ]
机构
[1] Vignan’s Foundation for Science, Technology and Research, Guntur District, Vadlamudi, Andhra Pradesh
[2] Vignan’s LARA Institute of Technology and Science, Guntur District, Vadlamudi, Andhra Pradesh
来源
Journal of The Institution of Engineers (India): Series B | 2020年 / 101卷 / 05期
关键词
Audio; Image; Lagrange’s interpolation; Pearson correlation; Polynomial; Secret sharing; Text;
D O I
10.1007/s40031-020-00475-4
中图分类号
学科分类号
摘要
Confidential information can be shared in a group with secret sharing scheme where no single user can retrieve the secret. Only few or more in the group together only can restore the secret. The secret could be in the form of numeric, text, image, audio, etc. There are different methods to deal with the above said secrets. In this paper, Lagrange’s interpolation method is applied in the formation and restoration of shares on numeric, text, image and audio. Constant coefficients and random coefficients are used while considering the coefficients of polynomial and dissimilarity between shares, and secret is measured using Pearson correlation coefficient. © 2020, The Institution of Engineers (India).
引用
收藏
页码:609 / 621
页数:12
相关论文
共 10 条
[1]  
Shivendra S., Shailendra T., Krishn K.M., Zhigao Z., Arun K.S., Providing security and privacy to huge and vulnerable songs repository using visual cryptography, Multimed. Tools Appl., 77, 9, pp. 11101-11120, (2018)
[2]  
Washio S., Watanabe Y., Security of audio secret sharing scheme encrypting audio secrets with bounded shares, In International Conference on Acoustics, Speech and Signal Processing, IEEE, Italy, pp. 7396-7400, (2014)
[3]  
Shamir A., How to share a secret, Commun. ACM, 22, 11, pp. 612-613, (1979)
[4]  
Abukari Yakubu M., Namunu C.M., Pradeep K.A., Audio secret management scheme using Shamir’s secret sharing, In International Conference on Multimedia Modeling, Springer Link, LNCS, 8935, pp. 396-407, (2015)
[5]  
Thien C.C., Lin J.C., Secret image sharing, Comput. Gr., 26, 5, pp. 765-770, (2002)
[6]  
Wang R., Shyu S., Scalable secret image sharing, Sig. Process. Image Commun., 22, 4, pp. 363-373, (2007)
[7]  
Yvo D., Shuang H., Jean-Jacques Q., Audio and Optical Cryptography, 1514, pp. 392-404, (1998)
[8]  
Daniel S., Spyros S.M., General Access Structures in Audio Cryptography, 6, (2005)
[9]  
Huan L., Zheng Q., Xuanping Z., Xu W., Auditory cryptography security algorithm with audio shelters, Adv. Control Eng. Inform. Sci. -Proc. Eng., 15, pp. 2695-2699, (2011)
[10]  
Ehdaie M., Eghlidos T., Aref M.R., A novel secret sharing scheme from audio perspective, In International Symposium on Telecommunications, IEEE, Tehran, pp. 13-18, (2008)