{"title":"基于改进LSB算法的秘密图像共享方案","authors":"Xiaohong Li, Yuan Chen, Feng Wang, Tao Qinqin","doi":"10.1109/ICCCNT.2014.6963003","DOIUrl":null,"url":null,"abstract":"Secret sharing is a very important branch in the field of modern cryptography. Secret image sharing technology is the expansion of secret sharing in terms of image. When using this technology to share images, it can ensure the integrity and security of the image. In this paper, secret image used random shadow image which is generated from (t, n) threshold secret image sharing scheme. This paper adopted improved method of LSB to hide the secrets in n meaningful cover images that were provided randomly, which reflected good invisibility, then compared the level of similarity of extracted watermark and original watermark, and eventually got good effects. Finally, we made noise and cutting attack, which illustrated that the scheme has good robustness.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"The secret image sharing scheme based on improved LSB algorithm\",\"authors\":\"Xiaohong Li, Yuan Chen, Feng Wang, Tao Qinqin\",\"doi\":\"10.1109/ICCCNT.2014.6963003\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Secret sharing is a very important branch in the field of modern cryptography. Secret image sharing technology is the expansion of secret sharing in terms of image. When using this technology to share images, it can ensure the integrity and security of the image. In this paper, secret image used random shadow image which is generated from (t, n) threshold secret image sharing scheme. This paper adopted improved method of LSB to hide the secrets in n meaningful cover images that were provided randomly, which reflected good invisibility, then compared the level of similarity of extracted watermark and original watermark, and eventually got good effects. Finally, we made noise and cutting attack, which illustrated that the scheme has good robustness.\",\"PeriodicalId\":140744,\"journal\":{\"name\":\"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)\",\"volume\":\"63 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-07-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCNT.2014.6963003\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCNT.2014.6963003","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The secret image sharing scheme based on improved LSB algorithm
Secret sharing is a very important branch in the field of modern cryptography. Secret image sharing technology is the expansion of secret sharing in terms of image. When using this technology to share images, it can ensure the integrity and security of the image. In this paper, secret image used random shadow image which is generated from (t, n) threshold secret image sharing scheme. This paper adopted improved method of LSB to hide the secrets in n meaningful cover images that were provided randomly, which reflected good invisibility, then compared the level of similarity of extracted watermark and original watermark, and eventually got good effects. Finally, we made noise and cutting attack, which illustrated that the scheme has good robustness.