On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme

被引:0
|
作者
Daoshun Wang
Feng Yi
机构
[1] Tsinghua University,Department of Computer Science and Technology
关键词
Information Technology; Quantum Information; Full Article; Publisher Note;
D O I
暂无
中图分类号
学科分类号
摘要
Traditional Secret Sharing (SS) schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS) schemes decode the secret without computation, but each share is m times as big as the original and the quality of the reconstructed secret image is reduced. Probabilistic visual secret sharing (Prob.VSS) schemes for a binary image use only one subpixel to share the secret image; however the probability of white pixels in a white area is higher than that in a black area in the reconstructed secret image. SS schemes, VSS schemes, and Prob. VSS schemes have various construction methods and advantages. This paper first presents an approach to convert (transform) a [inline-graphic not available: see fulltext]-SS scheme to a [inline-graphic not available: see fulltext]-VSS scheme for greyscale images. The generation of the shadow images (shares) is based on Boolean XOR operation. The secret image can be reconstructed directly by performing Boolean OR operation, as in most conventional VSS schemes. Its pixel expansion is significantly smaller than that of VSS schemes. The quality of the reconstructed images, measured by average contrast, is the same as VSS schemes. Then a novel matrix-concatenation approach is used to extend the greyscale [inline-graphic not available: see fulltext]-SS scheme to a more general case of greyscale [inline-graphic not available: see fulltext]-VSS scheme.
引用
收藏
相关论文
共 50 条
  • [1] On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme
    Wang, Daoshun
    Yi, Feng
    [J]. EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2010,
  • [2] Proactive Secret Sharing Scheme Suitable for Asymmetric Secret Sharing Scheme
    Kaneko, Naoto
    Iwamura, Keiichi
    [J]. 2016 IEEE 5TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS, 2016,
  • [3] Cheater identifiable visual secret sharing scheme
    Gan Zhi & Chen Kefei1. Computer Science Department
    [J]. Journal of Systems Engineering and Electronics, 2005, (01) : 233 - 236
  • [4] A Novel Quantum Visual Secret Sharing Scheme
    Liu, Wenjie
    Xu, Yinsong
    Zhang, Maojun
    Chen, Junxiu
    Yang, Ching-Nung
    [J]. IEEE ACCESS, 2019, 7 : 114374 - 114384
  • [5] An Efficient Halftone Visual Secret Sharing Scheme
    Arya, K. V.
    Rishiwal, Vinay
    Yadav, Arun Kumar
    [J]. 2014 9TH INTERNATIONAL CONFERENCE ON INDUSTRIAL AND INFORMATION SYSTEMS (ICIIS), 2014, : 70 - 74
  • [6] Secret Sharing Scheme: Vector Space Secret Sharing and φ Function
    Atici, Mustafa
    [J]. 2012 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM), 2012, : 914 - 918
  • [7] A Compact Secret Image Sharing Scheme Based on Flexible Secret Matrix Sharing Scheme
    Wang, Lingfu
    Wang, Jing
    Zhang, Mingwu
    Huang, Weijia
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2021, PT III, 2022, 13157 : 411 - 431
  • [8] General secret sharing scheme
    Tan, KJ
    Zhu, HW
    [J]. COMPUTER COMMUNICATIONS, 1999, 22 (08) : 755 - 757
  • [9] A Construction of Secret Sharing Scheme
    Goh, Y. L.
    Wong, Denis C. K.
    [J]. MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES, 2015, 9 : 89 - 101