A Resistant Secret Sharing Scheme

被引:0
|
作者
Chang, Chin-Chen [1 ]
Chen, Yen-Chang [1 ]
Lin, Chia-Chen [2 ]
机构
[1] Feng Chia Univ, Dept Comp Sci & Informat Engn, Taichung 40724, Taiwan
[2] Providence Univ, Dept Comp Sci & Informat Management, Taichung 43301, Taiwan
来源
FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS | 2009年
关键词
(7,4) hamming code; reversible data hiding; torus automorphism; secret sharing;
D O I
10.1109/IAS.2009.324
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper. we proposed a novel (2, 2) secret sharing scheme applied for grayscale images. This scheme can produce two noise-like shared Images that help avoid a secret image being grabbed. The construction phase of shared image consists of producing two shared images of the secret image by a (7, 4) Hamming code operation. To prevent a attackers from forging shared images, a logo is embedded into the shared images first by using Tian's reversible data embedding scheme. Later, the embedded secret image is shuffling by Torus automorphism to enhance its security. Experimental results show that the nois-like shared images can be successfully generated by our proposed scheme.
引用
收藏
页码:61 / +
页数:2
相关论文
共 50 条
  • [1] On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme
    Wang, Daoshun
    Yi, Feng
    EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2010,
  • [2] On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme
    Daoshun Wang
    Feng Yi
    EURASIP Journal on Advances in Signal Processing, 2010
  • [3] Proactive Secret Sharing Scheme Suitable for Asymmetric Secret Sharing Scheme
    Kaneko, Naoto
    Iwamura, Keiichi
    2016 IEEE 5TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS, 2016,
  • [4] Secret Sharing Scheme: Vector Space Secret Sharing and φ Function
    Atici, Mustafa
    2012 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM), 2012, : 914 - 918
  • [5] An Isogeny-based Quantum-Resistant Secret Sharing Scheme
    Eslami, Khadijeh
    Bahramian, Mojtaba
    FILOMAT, 2022, 36 (10) : 3249 - 3258
  • [6] A Compact Secret Image Sharing Scheme Based on Flexible Secret Matrix Sharing Scheme
    Wang, Lingfu
    Wang, Jing
    Zhang, Mingwu
    Huang, Weijia
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2021, PT III, 2022, 13157 : 411 - 431
  • [7] General secret sharing scheme
    Tan, KJ
    Zhu, HW
    COMPUTER COMMUNICATIONS, 1999, 22 (08) : 755 - 757
  • [8] A generalized secret sharing scheme
    Chang, CC
    Tsai, HM
    JOURNAL OF SYSTEMS AND SOFTWARE, 1997, 36 (03) : 267 - 272
  • [9] Secret Sharing Scheme with Reversing
    Mishra, Abhishek
    Gupta, Ashutosh
    2015 1ST INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2015, : 370 - 373
  • [10] Secret Sharing Scheme with Fairness
    Tian, Youliang
    Ma, Jianfeng
    Peng, Changgen
    Zhu, Jianming
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 494 - 500