{"title":"噪声共享图像重建秘密图像的校正","authors":"Laura Bertojo, W. Puech","doi":"10.1109/IPTA54936.2022.9784125","DOIUrl":null,"url":null,"abstract":"Protecting sensitive images is nowadays a key issue in information security domain. As such, numerous techniques have emerged to securely transmit or store such multimedia data, as encryption, steganography or secret sharing. Most of today's secret image sharing methods relie on the polynomial-based scheme proposed by Shamir. However, some of the shared images distributed to the participants may be noised between their creation and their use to retrieve the secret image. Noise can be added to a shared image during transmission, storage or JPEG compression for example. However, to our knowledge, to date no analysis has been made on the impact of using a noised shared image in the reconstruction process of a secret image. In this paper, we propose a method to correct the errors during the reconstruction of a secret image using noised shared images.","PeriodicalId":381729,"journal":{"name":"2022 Eleventh International Conference on Image Processing Theory, Tools and Applications (IPTA)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Correction of Secret Images Reconstructed from Noised Shared Images\",\"authors\":\"Laura Bertojo, W. Puech\",\"doi\":\"10.1109/IPTA54936.2022.9784125\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Protecting sensitive images is nowadays a key issue in information security domain. As such, numerous techniques have emerged to securely transmit or store such multimedia data, as encryption, steganography or secret sharing. Most of today's secret image sharing methods relie on the polynomial-based scheme proposed by Shamir. However, some of the shared images distributed to the participants may be noised between their creation and their use to retrieve the secret image. Noise can be added to a shared image during transmission, storage or JPEG compression for example. However, to our knowledge, to date no analysis has been made on the impact of using a noised shared image in the reconstruction process of a secret image. In this paper, we propose a method to correct the errors during the reconstruction of a secret image using noised shared images.\",\"PeriodicalId\":381729,\"journal\":{\"name\":\"2022 Eleventh International Conference on Image Processing Theory, Tools and Applications (IPTA)\",\"volume\":\"62 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-04-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 Eleventh International Conference on Image Processing Theory, Tools and Applications (IPTA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IPTA54936.2022.9784125\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 Eleventh International Conference on Image Processing Theory, Tools and Applications (IPTA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IPTA54936.2022.9784125","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Correction of Secret Images Reconstructed from Noised Shared Images
Protecting sensitive images is nowadays a key issue in information security domain. As such, numerous techniques have emerged to securely transmit or store such multimedia data, as encryption, steganography or secret sharing. Most of today's secret image sharing methods relie on the polynomial-based scheme proposed by Shamir. However, some of the shared images distributed to the participants may be noised between their creation and their use to retrieve the secret image. Noise can be added to a shared image during transmission, storage or JPEG compression for example. However, to our knowledge, to date no analysis has been made on the impact of using a noised shared image in the reconstruction process of a secret image. In this paper, we propose a method to correct the errors during the reconstruction of a secret image using noised shared images.