期刊论文详细信息
IEEE Access
Secret Image Sharing Based on Encrypted Pixels
Ching-Nung Yang1  Yi Cao2  Zhili Zhou2  Xingming Sun2 
[1] Department of Computer Science and Information Engineering, National Dong Hwa University, Hualien County, Taiwan;Jiangsu Engineering Center of Network Monitoring, School of Computer and Software, NanJing University of Information Science and Technology, Nanjing, China;
关键词: Encryption;    permutation;    secret sharing;    secret image sharing;    visual cryptography;   
DOI  :  10.1109/ACCESS.2018.2811722
来源: DOAJ
【 摘 要 】

The well-known Thien and Lin's (k, n) secret image sharing (SIS) scheme and its extended versions are threshold schemes, in which a secret image is shared among n shadow images and it can be recovered from any k shadow images. To reduce the size of shadow image, in those schemes, secret image pixels are embedded in all coefficients of (k -1)-degree polynomial to generate the shadows. Also, the secret pixels are permuted before the sharing to address the residual-image problem on shadow images. Due to the above two approaches, partial secret information can be exposed from (k - 1) shadow images, and thus the threshold properties of those schemes will be compromised. To overcome this weakness, we propose a novel (k, n)-SIS scheme based on encrypted pixels, whose shadow image size is slightly larger than that of Thien and Lin's scheme. By slightly modifying the secret image, we also propose a modified (k, n)-SIS scheme with the same shadow size of Thien and Lin's scheme.

【 授权许可】

Unknown   

  文献评价指标  
  下载次数:0次 浏览次数:0次