scholarly journals XOR-Based Progressively Secret Image Sharing

Mathematics ◽  
2021 ◽  
Vol 9 (6) ◽  
pp. 612
Author(s):  
Cheng-Shian Lin ◽  
Chien-Chang Chen ◽  
Yu-Cheng Chen

Secret image sharing technology is a strategy for jointly protecting secret images. The (n, n) secret image sharing problem can be solved by conventional Boolean calculation easily. However, how to recover secret images with progressive steps is not addressed. In this study, we proposed an XOR-based (m, t, Ti) multi-secret image sharing scheme that shares m secret images among m participants and recovers m shared images progressively with t thresholds. The proposed secret images partition strategy (SIPS) partitions m secret images to generate intermediate images for different thresholds in the sharing procedure. Based on progressive recovery property, the proposed recovery method recovers parts of the secret images by gathering consecutive shared images. Moreover, gathering all shared images can perfectly recover all secret images. The experimental results show that the proposed XOR-based multi-secret image sharing method has high security and efficiency.

2013 ◽  
Vol 284-287 ◽  
pp. 3025-3029
Author(s):  
Kuang Shyr Wu ◽  
Tsung Ming Lo

This paper refers to a novel (r, n)-threshold secret image sharing scheme with low information overhead. The secret image is encoded into n noise-like shadow images in such a way that any r of the n shares can be used to reveal the secret, and no information about the secret can be revealed from any r–1 or fewer shares. The size of the shadow images is relatively small. Compared with the commonly used in the field of secret image sharing “Thien-Lin algorithm (2002),” the proposed scheme provides an alternative solution for light images. For the security analysis in the case of a 256x256 gray level secret image, if a hacker acquires any r – 1 shadow images, the hacker can construct only r – 1 equations, then the possibility of guessing the right solution is only 1/256. Hence, there are (256x256)/r polynomials, the possibility of obtaining the right image is only (1/256) (256x256)/r. The experimental results and theoretically analysis demonstrate that the proposed scheme performs well.


2018 ◽  
Vol 10 (3) ◽  
pp. 78-94 ◽  
Author(s):  
Peng Li ◽  
Zuquan Liu

This article describes how in conventional (k, n) secret image sharing (SIS), any k or more shadows can be collaborated together to reveal the secret image. Usually, all shadows have the same importance. Recently, an essential (t, s, k, n) secret image sharing (ESIS) with different importance of shadows were proposed where the n shadows are divided into s essential shadows and n − s non-essential shadows. In reconstruction, it needs at least k shadows which should include at least t essential shadows. In this article, the authors propose an improved (t, s, k, n)-ESIS scheme, where t<k. In their scheme, essential shadows and non-essential shadows have the equal sizes. No concatenation operation is needed in generating shadows. Besides, all shadow sizes are reduced to 1/k times of the secret image. Theoretical analyses and experimental results show that the proposed scheme is feasible with optimal sharing ratios among related works.


2017 ◽  
Vol 22 (S1) ◽  
pp. 2293-2307 ◽  
Author(s):  
Li Li ◽  
M. Shamim Hossain ◽  
Ahmed A. Abd El-Latif ◽  
M. F. Alhamid

2016 ◽  
Vol 9 (17) ◽  
pp. 4075-4088 ◽  
Author(s):  
Zhi-Hui Wang ◽  
Ya-Feng Di ◽  
Jianjun Li ◽  
Chin-Chen Chang ◽  
Hui Liu

2009 ◽  
Vol 179 (19) ◽  
pp. 3247-3254 ◽  
Author(s):  
Du-Shiau Tsai ◽  
Gwoboa Horng ◽  
Tzung-Her Chen ◽  
Yao-Te Huang

Sign in / Sign up

Export Citation Format

Share Document