Mignotte Sequence-Based Weighted Threshold Secret Image Sharing

Article Preview

Abstract:

In traditional secret image sharing schemes, participants have the same status and shadow images are of approximately equal importance, which cannot satisfy some special requirements in the real situation. In this paper, we consider the problem of secret image sharing with the weighted threshold access structure, which means different participants can have different status and significance. Under the circumstance, each shadow image has one weight, and the secret image can be losslessly reconstructed, if and only if the sum of all shadow images weights is no less than the given weight threshold. In our scheme, we first construct the weighted threshold access structure of shadow images using the weighted threshold secret sharing scheme. Then, we employ the quantization operation to embed the secret image information into a host image to generate shadow images with different weights. In the retrieving procedure, a set of shadow images satisfying the weighted threshold can be utilized to restore the distortion-free secret image.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2395-2399

Citation:

Online since:

March 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] A. Shamir: How to share a secret. Commun ACM 22. Vol. 22 (1979), pp.612-613.

DOI: 10.1145/359168.359176

Google Scholar

[2] G.R. Blakley: Safeguarding cryptographic keys. AFIPS Conf. Proc. Vol. 48 (1979), pp.313-317.

Google Scholar

[3] M. Naor, A. Shamir: Visual cryptography. In: Santis A (ed) Advances in Cryptology — EUROCRYPT'94. LNCS 950, Springer Berlin Heidelberg, (1995) pp.1-12.

DOI: 10.1007/bfb0053419

Google Scholar

[4] C.N. Yang: New visual secret sharing schemes using probabilistic method. Pattern Recognition Letters 25. Vol. 4 (2004), pp.481-494.

DOI: 10.1016/j.patrec.2003.12.011

Google Scholar

[5] T. Tassa: Hierarchical threshold secret sharing. Journal of Cryptology 20. Vol. 2 (2007), pp.237-264.

DOI: 10.1007/s00145-006-0334-8

Google Scholar

[6] C. Guo, C.C. Chang, C. Qin: A hierarchical threshold secret image sharing. Pattern Recognition Letters 33. Vol. 1 (2012), pp.83-91.

DOI: 10.1016/j.patrec.2011.09.030

Google Scholar

[7] C. Guo, C.C. Chang, C. Qin: A multi-threshold secret image sharing scheme based on MSP. Pattern Recognition Letters 33. Vol. 12 (2012), pp.1594-1600.

DOI: 10.1016/j.patrec.2012.04.010

Google Scholar

[8] S. Iftene, I. Boureanu: Weighted Threshold Secret Sharing Based on the Chinese Remainder Theorem. Sci. Ann. Cuza Univ. Vol 15 (2005), pp.161-172.

Google Scholar