Threshold changeable secret image sharing scheme based on interpolation polynomial

被引:76
|
作者
Liu, Yan-Xiao [1 ]
Yang, Ching-Nung [2 ]
Wu, Chi-Ming [2 ]
Sun, Qin-Dong [1 ]
Bi, Wei [3 ]
机构
[1] Xian Univ Technol, Dept Comp Sci & Engn, Xian, Shaanxi, Peoples R China
[2] Natl Dong Hwa Univ, Dept CSIE, Shoufeng Township, Hualien County, Taiwan
[3] SeeleTech Corp, San Francisco, CA USA
关键词
Secret image sharing; Threshold changeable; Interpolation polynomial; BOOLEAN-OPERATIONS;
D O I
10.1007/s11042-019-7205-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In previous (k,n) secret image sharing scheme, the threshold k is decided by dealer according to the security requirement, and this threshold value is fixed without considering the dynamic secure environment in future. In this work, we propose a novel threshold changeable secret image sharing scheme where the threshold value can be changed according to the changeable security requirement. In our scheme, each participant only needs to keep one initial shadow. When reconstructing image, the dealer decides the threshold according to security level. If the threshold is unchanged, any k or more initial shadows can recover the image; else if the threshold is increased or decreased, dealer publishes additional information, each participant update their shadows accordingly such that the threshold of updated shadows is changed correspondingly. The contribution of our work is that the threshold of shadows can be changed flexibly to satisfy the dynamic secure environment, and each participant only need to keep one initial shadows. The feature of threshold changeable makes our scheme more practical than previous secret image sharing in some complicated applications.
引用
收藏
页码:18653 / 18667
页数:15
相关论文
共 50 条
  • [41] Secret image sharing scheme with hierarchical threshold access structure
    Pakniat, Nasrollah
    Noroozi, Mahnaz
    Eslami, Ziba
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2014, 25 (05) : 1093 - 1101
  • [42] An efficient (t,n)-threshold secret image sharing scheme
    Kanso, Ali
    Ghebleh, Mohammad
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (15) : 16369 - 16388
  • [43] A Linear Algebraic Threshold Essential Secret Image Sharing Scheme
    Ghebleh, Mohammad
    Kanso, Ali
    Alazemi, Abdullah
    MATHEMATICS, 2022, 10 (05)
  • [44] A (t, n) threshold quantum image secret sharing scheme
    Wang, Hua-Kun
    Xu, Guang-Bao
    Liang, Xiang-Qian
    Jiang, Dong-Huan
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (33) : 79715 - 79739
  • [45] An efficient (t,n)–threshold secret image sharing scheme
    Ali Kanso
    Mohammad Ghebleh
    Multimedia Tools and Applications, 2017, 76 : 16369 - 16388
  • [46] Polynomial-based extended secret image sharing scheme with reversible and unexpanded covers
    Liu, Lintao
    Lu, Yuliang
    Yan, Xuehu
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (02) : 1265 - 1287
  • [47] A Lossless Polynomial-Based Secret Image Sharing Scheme Utilizing the Filtering Operation
    Liu, Lintao
    Lu, Yuliang
    Yan, Xuehu
    Ding, Wanmeng
    Xuan, Qitian
    SECURITY WITH INTELLIGENT COMPUTING AND BIG-DATA SERVICES, 2020, 895 : 129 - 139
  • [48] A verifiable (t,n) threshold quantum secret sharing scheme based on asymmetric binary polynomial
    Guan, Feiting
    Guo, Jiansheng
    Li, Lele
    LASER PHYSICS, 2023, 33 (12)
  • [49] Participants Increasing for Shamir's Polynomial-based Secret Image Sharing Scheme
    Ding, Wanmeng
    Liu, Kesheng
    Liu, Lintao
    Yan, Xuehu
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY, IEEE 3RD INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 2ND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2017, : 32 - 36
  • [50] Polynomial-based extended secret image sharing scheme with reversible and unexpanded covers
    Lintao Liu
    Yuliang Lu
    Xuehu Yan
    Multimedia Tools and Applications, 2019, 78 : 1265 - 1287