{"title":"Comparison and analysis of secret image sharing principles","authors":"Jiayu Wang, Lintao Liu, Jia Chen, Xuehu Yan","doi":"10.1109/CCCI52664.2021.9583215","DOIUrl":null,"url":null,"abstract":"Secret image sharing (SIS) means to share a secret image into multiple shadow images, and the secret image can be recovered when a sufficient number of shadow images are obtained. SIS has the advantages of loss tolerance, simple encryption and decryption, scattered storage and so on. This paper describes three realization principles(i.e., the polynomial-based SIS, SIS based on the Chinese remainder theorem and visual secret sharing), verifies them with experiments, and calculates the PSNR, SSIM values and the time cost for each scheme to recover the image. Comparing the values of each index and the visual quality of the restored images can more intuitively reflect the advantages and disadvantages of each scheme. Finally, the advantages and disadvantages of each algorithm are analyzed by combining the theory and experimental results of the algorithm.","PeriodicalId":136382,"journal":{"name":"2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2021-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCCI52664.2021.9583215","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Secret image sharing (SIS) means to share a secret image into multiple shadow images, and the secret image can be recovered when a sufficient number of shadow images are obtained. SIS has the advantages of loss tolerance, simple encryption and decryption, scattered storage and so on. This paper describes three realization principles(i.e., the polynomial-based SIS, SIS based on the Chinese remainder theorem and visual secret sharing), verifies them with experiments, and calculates the PSNR, SSIM values and the time cost for each scheme to recover the image. Comparing the values of each index and the visual quality of the restored images can more intuitively reflect the advantages and disadvantages of each scheme. Finally, the advantages and disadvantages of each algorithm are analyzed by combining the theory and experimental results of the algorithm.