(k, n) threshold secret image sharing scheme based on Chinese remainder theorem with authenticability

被引:0
|
作者
Fei Hu
Weihai Li
Nenghai Yu
机构
[1] University of Science and Technology of China,School of Cyber Science and Technology
来源
关键词
Secret image sharing; Authentication; Chinese remainder theorem; QR code;
D O I
暂无
中图分类号
学科分类号
摘要
In the traditional secret image sharing (SIS) scheme, the secret image is divided into several noise-like shares, which lack authentication and may attract the attention of malicious users. Therefore, the authenticability of shadow images may play an important role and is worthy of investigation. Traditional shadow authentication research requires additional image or additional bits for authentication, which may lead to high complexity. In this paper, we propose a novel (k, n) threshold SIS scheme that is based on the Chinese remainder theorem (CRT) with shadow authenticability. Our contribution is that the secret grayscale image is distributed into n shadows, while each shadow image contains authentication information with QR code embedding. Our scheme can realize the 100% detection rate of fake participants when a credible control center is involved. The experimental results confirm that the proposed scheme has low shadow generation, authentication complexity, and the lossless recovery of secret image.
引用
收藏
页码:40713 / 40732
页数:19
相关论文
共 50 条
  • [1] (k, n) threshold secret image sharing scheme based on Chinese remainder theorem with authenticability
    Hu, Fei
    Li, Weihai
    Yu, Nenghai
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (14) : 40713 - 40732
  • [2] Weighted Secret Image Sharing for a (k, n) Threshold Based on the Chinese Remainder Theorem
    Tan, Longdan
    Lu, Yuliang
    Yan, Xuehu
    Liu, Lintao
    Li, Longlong
    [J]. IEEE ACCESS, 2019, 7 : 59278 - 59286
  • [3] Chinese Remainder Theorem-Based Secret Image Sharing for (k, n) Threshold
    Yan, Xuehu
    Lu, Yuliang
    Liu, Lintao
    Wan, Song
    Ding, Wanmeng
    Liu, Hanlin
    [J]. CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 : 433 - 440
  • [4] Secret Image Sharing for (k, k) Threshold Based on Chinese Remainder Theorem and Image Characteristics
    Yan, Xuehu
    Lu, Yuliang
    Liu, Lintao
    Wan, Song
    Ding, Wanmeng
    Liu, Hanlin
    [J]. IMAGE AND VIDEO TECHNOLOGY (PSIVT 2017), 2018, 10749 : 174 - 181
  • [5] Threshold Secret Image Sharing by Chinese Remainder Theorem
    Shyu, Shyong Jian
    Chen, Ying-Ru
    [J]. 2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS, 2008, : 1332 - 1337
  • [6] A Threshold Secret Sharing Scheme Based on LMCA and Chinese Remainder Theorem
    Lu, Dianjun
    Wang, Yu
    Zhang, Xiaoqin
    Ji, Lanfen
    [J]. PROCEEDINGS OF 2016 9TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID), VOL 2, 2016, : 439 - 442
  • [7] Lossless (k, n)-Threshold Image Secret Sharing Based on the Chinese Remainder Theorem Without Auxiliary Encryption
    Li, Longlong
    Lu, Yuliang
    Yan, Xuehu
    Liu, Lintao
    Tan, Longdan
    [J]. IEEE ACCESS, 2019, 7 : 75113 - 75121
  • [8] A new threshold changeable secret sharing scheme based on the Chinese Remainder Theorem
    Jia, Xingxing
    Wang, Daoshun
    Nie, Daxin
    Luo, Xiangyang
    Sun, Jonathan Zheng
    [J]. INFORMATION SCIENCES, 2019, 473 : 13 - 30
  • [9] Multi-secret Threshold Sharing Scheme Based on Chinese Remainder Theorem
    Song, Yinong
    Li, Zichen
    [J]. 2024 4TH INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND SOFTWARE ENGINEERING, ICICSE 2024, 2024, : 131 - 135
  • [10] A reversible extended secret image sharing scheme based on Chinese remainder theorem
    Meng, Keju
    Miao, Fuyou
    Xiong, Yan
    Chang, Chin-Chen
    [J]. SIGNAL PROCESSING-IMAGE COMMUNICATION, 2021, 95