Further improvements on secret image sharing scheme

MiFor '10 Pub Date : 2010-10-29 DOI:10.1145/1877972.1877989
Saeed Alharthi, P. Atrey
{"title":"Further improvements on secret image sharing scheme","authors":"Saeed Alharthi, P. Atrey","doi":"10.1145/1877972.1877989","DOIUrl":null,"url":null,"abstract":"Secret image sharing technique has been widely researched in the past decade. This technique allows us to create the share images from a secret image in such a way that an individual share does not reveal any information about the secret image, however when a specified number of shares are brought together, they can be used to reconstruct the secret image. In this paper, we first point out the weaknesses of the existing secret image sharing methods proposed by Thien and Lin [8] and Alharthi and Atrey [1], and then propose a new method that overcomes these weaknesses. Thien and Lin [8] use a permutation step which leads to disclosure of the secret image if the permutation key is revealed. Alharthi and Atrey [1] suggested an improvement over Thien and Lin's method by removing the permutation step. However, their method has a limitation that the first few shares are not usable because of its similarity with the secret image. We propose further improvement over these two methods by repeatedly changing the value of share number using a modulo prime function. To show the superiority of our method over others, we present the security analysis and experimental results.","PeriodicalId":355677,"journal":{"name":"MiFor '10","volume":"80 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"16","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"MiFor '10","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1877972.1877989","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 16

Abstract

Secret image sharing technique has been widely researched in the past decade. This technique allows us to create the share images from a secret image in such a way that an individual share does not reveal any information about the secret image, however when a specified number of shares are brought together, they can be used to reconstruct the secret image. In this paper, we first point out the weaknesses of the existing secret image sharing methods proposed by Thien and Lin [8] and Alharthi and Atrey [1], and then propose a new method that overcomes these weaknesses. Thien and Lin [8] use a permutation step which leads to disclosure of the secret image if the permutation key is revealed. Alharthi and Atrey [1] suggested an improvement over Thien and Lin's method by removing the permutation step. However, their method has a limitation that the first few shares are not usable because of its similarity with the secret image. We propose further improvement over these two methods by repeatedly changing the value of share number using a modulo prime function. To show the superiority of our method over others, we present the security analysis and experimental results.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
对秘密图像共享方案的进一步改进
秘密图像共享技术在过去的十年中得到了广泛的研究。这种技术允许我们以这样一种方式从一个秘密图像创建共享图像,即单个共享不会泄露关于秘密图像的任何信息,但是当指定数量的共享被集中在一起时,它们可以用来重建秘密图像。在本文中,我们首先指出了Thien and Lin[8]和Alharthi and Atrey[1]提出的现有秘密图像共享方法的弱点,然后提出了一种新的方法来克服这些弱点。Thien和Lin[8]使用排列步骤,如果排列密钥被披露,则导致秘密图像的披露。Alharthi和Atrey[1]对Thien和Lin的方法进行了改进,去掉了置换步骤。但是,该方法有一个局限性,即前几个共享由于与秘密图像相似而无法使用。在这两种方法的基础上,我们提出了利用模素数函数反复改变共享数值的改进方法。为了证明我们的方法优于其他方法,我们给出了安全性分析和实验结果。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
When multimedia meets surveillance and forensics in people security Privacy preserving video surveillance using pedestrian tracking mechanism A game-theoretic system security design for the visible watermarking Videntifier" Forensic: large-scale video identification in practice Imputing human descriptions in semantic biometrics
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1