{"title":"基于GF(2^8)的可逆秘密共享方案","authors":"Dong-Hyun Kim, Gil-Je Lee, M. Park, K. Yoo","doi":"10.1109/ITNG.2012.101","DOIUrl":null,"url":null,"abstract":"Lin and Chan proposed reversible secret sharing scheme in 2010. The advantages of this scheme are as follows: a low distortion, high capacity of shadow images and usage of the reversible method. However, this scheme has some problems. First, the number of participants is limited because of modulus prime number m. Second, the overflow can occur by additional operations in the embedding procedure. Finally, the coefficient of (t-1)-th degree polynomial can be zero due to the property of the cover image pixel. The proposed scheme solves these problems of the Lin and Chan's scheme. In order to solve these problems, a new polynomial technique are utilized in the proposed scheme. In the experimental results, PSNR of their scheme is decreased with the increase of embedding capacity. However, in the proposed scheme, even if the embedding capacity increase, PSNR value of about 45dB or more is maintained uniformly.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A Reversible Secret Sharing Scheme Based on GF(2^8)\",\"authors\":\"Dong-Hyun Kim, Gil-Je Lee, M. Park, K. Yoo\",\"doi\":\"10.1109/ITNG.2012.101\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Lin and Chan proposed reversible secret sharing scheme in 2010. The advantages of this scheme are as follows: a low distortion, high capacity of shadow images and usage of the reversible method. However, this scheme has some problems. First, the number of participants is limited because of modulus prime number m. Second, the overflow can occur by additional operations in the embedding procedure. Finally, the coefficient of (t-1)-th degree polynomial can be zero due to the property of the cover image pixel. The proposed scheme solves these problems of the Lin and Chan's scheme. In order to solve these problems, a new polynomial technique are utilized in the proposed scheme. In the experimental results, PSNR of their scheme is decreased with the increase of embedding capacity. However, in the proposed scheme, even if the embedding capacity increase, PSNR value of about 45dB or more is maintained uniformly.\",\"PeriodicalId\":117236,\"journal\":{\"name\":\"2012 Ninth International Conference on Information Technology - New Generations\",\"volume\":\"17 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-04-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 Ninth International Conference on Information Technology - New Generations\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITNG.2012.101\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Ninth International Conference on Information Technology - New Generations","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITNG.2012.101","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Reversible Secret Sharing Scheme Based on GF(2^8)
Lin and Chan proposed reversible secret sharing scheme in 2010. The advantages of this scheme are as follows: a low distortion, high capacity of shadow images and usage of the reversible method. However, this scheme has some problems. First, the number of participants is limited because of modulus prime number m. Second, the overflow can occur by additional operations in the embedding procedure. Finally, the coefficient of (t-1)-th degree polynomial can be zero due to the property of the cover image pixel. The proposed scheme solves these problems of the Lin and Chan's scheme. In order to solve these problems, a new polynomial technique are utilized in the proposed scheme. In the experimental results, PSNR of their scheme is decreased with the increase of embedding capacity. However, in the proposed scheme, even if the embedding capacity increase, PSNR value of about 45dB or more is maintained uniformly.