A {k,n}-secret sharing scheme for color images

被引:0
|
作者
Lukac, R [1 ]
Plataniotis, KN [1 ]
Venetsanopoulos, AN [1 ]
机构
[1] Univ Toronto, Edward S Rogers Sr Dept Elect & Comp Engn, Toronto, ON M5S 3G4, Canada
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This paper introduces a new {k, n}-secret sharing scheme for color images. The proposed method encrypts the color image into n color shares. The secret information is recovered only if the k (or more) allowed shares are available for decryption. The proposed method utilizes the conventional {k, n}-secret sharing strategy by operating at the bit-levels of the decomposed color image. Modifying the spatial arrangements of the binary components, the method produces color shares with varied both the spectral characteristics among the RGB components and the spatial correlation between the neighboring color vectors. Since encryption is done in the decomposed binary domain, there is no obvious relationship in the RGB color domain between any two color shares or between the original color image and any of the n shares. This increases protection of the secret information. Inverse cryptographic processing of the shares must be realized in the decomposed binary domain and the procedure reveals the original color image with perfect reconstruction.
引用
收藏
页码:72 / 79
页数:8
相关论文
共 50 条
  • [41] A novel secret image sharing scheme for true-color images with size constraint
    Tsai, Du-Shiau
    Horng, Gwoboa
    Chen, Tzung-Her
    Huang, Yao-Te
    [J]. INFORMATION SCIENCES, 2009, 179 (19) : 3247 - 3254
  • [42] (k, n) secret image sharing scheme capable of cheating detection
    Liu, Yan-Xiao
    Sun, Qin-Dong
    Yang, Ching-Nung
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2018,
  • [43] (k,n) Secret Sharing Scheme against Two Types of Cheaters
    Liu, Yanxiao
    Wang, Yichuan
    Zhu, Lei
    Jiang, Jiwen
    Hei, Xinhong
    [J]. PROCEEDINGS 2016 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS NANA 2016, 2016, : 284 - 287
  • [44] An Optimal (k,n)Visual Secret Sharing Scheme for Information Security
    Hodeish, Mahmoud E.
    Bukauskas, Linas
    Humbe, Vikas T.
    [J]. PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATIONS, 2016, 93 : 760 - 767
  • [45] A Fast (k, L, n)-Threshold Ramp Secret Sharing Scheme
    Kurihara, Jun
    Kiyomoto, Shinsaku
    Fukushima, Kazuhide
    Tanaka, Toshiaki
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (08) : 1808 - 1821
  • [46] A verifiable (k, n)-threshold dynamic quantum secret sharing scheme
    Fulin Li
    Hang Hu
    Shixin Zhu
    Jiayun Yan
    Jian Ding
    [J]. Quantum Information Processing, 21
  • [47] (k,n) secret image sharing scheme capable of cheating detection
    Yan-Xiao Liu
    Qin-Dong Sun
    Ching-Nung Yang
    [J]. EURASIP Journal on Wireless Communications and Networking, 2018
  • [48] A verifiable (k, n)-threshold dynamic quantum secret sharing scheme
    Li, Fulin
    Hu, Hang
    Zhu, Shixin
    Yan, Jiayun
    Ding, Jian
    [J]. QUANTUM INFORMATION PROCESSING, 2022, 21 (07)
  • [49] A new (k, n)-threshold secret sharing scheme and its extension
    Kurihara, Jun
    Kiyomoto, Shinsaku
    Fukushima, Kazuhide
    Tanaka, Toshiaki
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2008, 5222 : 455 - 470
  • [50] A new (k, n) verifiable secret image sharing scheme (VSISS)
    Nag, Amitava
    Biswas, Sushanta
    Sarkar, Debasree
    Sarkar, Partha Pratim
    [J]. EGYPTIAN INFORMATICS JOURNAL, 2014, 15 (03) : 201 - 209