scholarly journals An Efficient Essential Secret Image Sharing Scheme Using Derivative Polynomial

Symmetry ◽  
2019 ◽  
Vol 11 (1) ◽  
pp. 69 ◽  
Author(s):  
Zhen Wu ◽  
Yi-Ning Liu ◽  
Dong Wang ◽  
Ching-Nung Yang

As a popular technology in information security, secret image sharing is a method to guarantee the secret image’s security. Usually, the dealer would decompose the secret image into a series of shadows and then assign them to a number of participants, and only a quorum of participants could recover the secret image. Generally, it is assumed that every participant is equal. Actually, due to their position in many practical applications, some participants are given special privileges. Therefore, it is desirable to give an approach to generate shadows with different priorities shadows. In this paper, an efficient essential secret image sharing scheme using a derivative polynomial is proposed. Compared with existing related works, our proposed scheme can not only create the same-sized shadows with smaller size but also removes the concatenation operation in the sharing phase. Theoretical analysis and simulations confirm the security and effectiveness of the proposed scheme.

2012 ◽  
Vol 190-191 ◽  
pp. 364-368
Author(s):  
Dan Tang ◽  
Kui Liu

Secret image sharing is an attractive research problem in information security filed. According to the high redundancy of the digital image, the paper proposed an entirely new secret image sharing scheme with threshold set. The new scheme makes secret image sharing more flexible, so we can apply the secret image sharing technology to more fields such as the storage of secret images, multichannel transmission of images and etc..


Symmetry ◽  
2021 ◽  
Vol 13 (2) ◽  
pp. 286
Author(s):  
Guohua Wu ◽  
Mingyao Wang ◽  
Qiuhua Wang ◽  
Ye Yao ◽  
Lifeng Yuan ◽  
...  

In secret image sharing, the image is divided into several stego images, which are managed by corresponding participants. The secret image can be recovered only when the number of authorized participants is no less than the threshold. Thus, it is widely used to protect essential images, such as engineering drawings and product design drawings. In the traditional secret image sharing scheme, the threshold is fixed and unique. However, in practice, the security policy and the adversarial structure may change; therefore, the threshold must be adjusted dynamically. In this paper, we propose a novel secret image sharing scheme with a changeable threshold capability. Our scheme eliminates the limit of the changeable threshold and reduces the computation required. Also, our scheme is the first threshold changeable secret image sharing scheme that can recover an undistorted cover image. The theoretical analysis shows that our scheme is safe even if the threshold is changed. The experiments demonstrated that the stego image generated by our algorithm has better quality than other changeable-threshold, secret image sharing algorithms.


2017 ◽  
Vol 22 (S1) ◽  
pp. 2293-2307 ◽  
Author(s):  
Li Li ◽  
M. Shamim Hossain ◽  
Ahmed A. Abd El-Latif ◽  
M. F. Alhamid

2016 ◽  
Vol 9 (17) ◽  
pp. 4075-4088 ◽  
Author(s):  
Zhi-Hui Wang ◽  
Ya-Feng Di ◽  
Jianjun Li ◽  
Chin-Chen Chang ◽  
Hui Liu

2009 ◽  
Vol 179 (19) ◽  
pp. 3247-3254 ◽  
Author(s):  
Du-Shiau Tsai ◽  
Gwoboa Horng ◽  
Tzung-Her Chen ◽  
Yao-Te Huang

Sign in / Sign up

Export Citation Format

Share Document