{"title":"基于矩阵乘法的多秘密图像共享","authors":"Zhengfeng Hou, Hanjun Gao","doi":"10.1109/NSWCTC.2009.94","DOIUrl":null,"url":null,"abstract":"Based on matrix multiplication secret sharing method, a multi-secret images sharing scheme is presented. In our scheme, participants only need to pool their pseudo-shadow instead of disclosing his secret share when recovering secret images. That is to say, each participant can share many secret images with others by holding only one secret share. Unlike other known image sharing scheme, it doesn’t generating shadow images which are difficult to manage and identify. Integrating the above advantages, this scheme is a practical and effective multi-secret image sharing scheme.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Multi-secret Images Sharing Based on Matrix Multiplication\",\"authors\":\"Zhengfeng Hou, Hanjun Gao\",\"doi\":\"10.1109/NSWCTC.2009.94\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Based on matrix multiplication secret sharing method, a multi-secret images sharing scheme is presented. In our scheme, participants only need to pool their pseudo-shadow instead of disclosing his secret share when recovering secret images. That is to say, each participant can share many secret images with others by holding only one secret share. Unlike other known image sharing scheme, it doesn’t generating shadow images which are difficult to manage and identify. Integrating the above advantages, this scheme is a practical and effective multi-secret image sharing scheme.\",\"PeriodicalId\":433291,\"journal\":{\"name\":\"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-04-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NSWCTC.2009.94\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NSWCTC.2009.94","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Multi-secret Images Sharing Based on Matrix Multiplication
Based on matrix multiplication secret sharing method, a multi-secret images sharing scheme is presented. In our scheme, participants only need to pool their pseudo-shadow instead of disclosing his secret share when recovering secret images. That is to say, each participant can share many secret images with others by holding only one secret share. Unlike other known image sharing scheme, it doesn’t generating shadow images which are difficult to manage and identify. Integrating the above advantages, this scheme is a practical and effective multi-secret image sharing scheme.