PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Sharing Numerous Images Secretly with Reduced Possessing Load

Autorzy
Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
This work presents a secret image sharing approach for sharing several secret images while reducing each participant's possessing load to only one shared image. The proposed approach employs a random image and a hash function to create corresponding random-like shift images for each secret image, and then publishes the generated images. The random image is then secretly shared to each participant, such that each participant can only possess one shared image to recover the random image, thus enabling the computation of all secret images. The contiguous hash results modify the secret images to random-like public images that are secure for malicious attacks. Experimental results indicate that the proposed method can share several secret images but reduce the possessing load of each participant efficiently. Attacks on shared or public images are also discussed.
Wydawca
Rocznik
Strony
447--458
Opis fizyczny
bibliogr. 14 poz., fot., wykr.
Twórcy
autor
autor
Bibliografia
  • [1] Blundo, C., Santis, A., Naor,M.: Visual Cryptography for grey level images, Information Processing Letters, 75(6), 2000, 255-259.
  • [2] Chen, S. K., , Lin, J. C.: Fault-tolerance and progressive transmission of images, Pattern Recognition, 38, 2005, 2466-2471.
  • [3] Cimato, S., Santis, A., Ferrara, A., Masucci, B.: Ideal contrast visual cryptography schemes with reversing, Information Processing Letters, 93(4), 2005, 199-206.
  • [4] He, J., Dawson, E.: Multistage secret sharing based on one-way function, Electronics Letters, 30(19), 1994, 1591-1592.
  • [5] Hou, Y.: Visual cryptography for color images, Pattern Recognition, 36(7), 2003, 1619-1629.
  • [6] Lin, C., Tsai, W.: Visual cryptography for gray-level images by dithering techniques, Pattern Recognition Letters, 24, 2003, 349-358.
  • [7] Nakajima, M., Yamaguchi, Y.: Extended visual cryptography for natural images, Journal of WSCG, 10(2), 2002, 303-310.
  • [8] Naor, M., Shamir, A.: Visual Cryptography, Advances in Cryptology, Eurpocrypt'94. Springer-Verlag, Berlin, 1995, 1-12.
  • [9] Rivest, R. L.: The MD5 message digest algorithm, Internet Network Working Group RFC 1321, April 1992.
  • [10] Shamir, A.: How to share a secret, Communication of the ACM, 22(11), 1979, 612-613.
  • [11] Shyu, S. J.: Efficient visual secret sharing scheme for color images, Pattern Recognition, 39(5), 2006, 866- 880.
  • [12] Thien, C., Lin, J.: Secret image sharing, Computers & Graphics, 26(5), 2002, 765-770.
  • [13] Viet, D., Kurosawa, K.: Almost ideal contrast visual cryptography with reversing, Lecture Notes in Comput. Sci., 2964, Springer, Berlin, 2004, 353-365.
  • [14] Wu, Y. S., Thien, C. C., Lin, J. C.: Sharing and hiding secret images with size constraint, Pattern Recognition, 37(7), 2004, 1377-1385.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BUS5-0018-0023
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.