Czasopismo
2008
|
Vol. 86, nr 4
|
447-458
Tytuł artykułu
Autorzy
Wybrane pełne teksty z tego czasopisma
Warianty tytułu
Języki publikacji
Abstrakty
This work presents a secret image sharing approach for sharing several secret images while reducing each participant's possessing load to only one shared image. The proposed approach employs a random image and a hash function to create corresponding random-like shift images for each secret image, and then publishes the generated images. The random image is then secretly shared to each participant, such that each participant can only possess one shared image to recover the random image, thus enabling the computation of all secret images. The contiguous hash results modify the secret images to random-like public images that are secure for malicious attacks. Experimental results indicate that the proposed method can share several secret images but reduce the possessing load of each participant efficiently. Attacks on shared or public images are also discussed.
Słowa kluczowe
Czasopismo
Rocznik
Tom
Strony
447-458
Opis fizyczny
bibliogr. 14 poz., fot., wykr.
Twórcy
autor
autor
- Department of Computer Science, Hsuan Chuang University, Hsinchu 300, Taiwan, cchen34@hcu.edu.tw
Bibliografia
- [1] Blundo, C., Santis, A., Naor,M.: Visual Cryptography for grey level images, Information Processing Letters, 75(6), 2000, 255-259.
- [2] Chen, S. K., , Lin, J. C.: Fault-tolerance and progressive transmission of images, Pattern Recognition, 38, 2005, 2466-2471.
- [3] Cimato, S., Santis, A., Ferrara, A., Masucci, B.: Ideal contrast visual cryptography schemes with reversing, Information Processing Letters, 93(4), 2005, 199-206.
- [4] He, J., Dawson, E.: Multistage secret sharing based on one-way function, Electronics Letters, 30(19), 1994, 1591-1592.
- [5] Hou, Y.: Visual cryptography for color images, Pattern Recognition, 36(7), 2003, 1619-1629.
- [6] Lin, C., Tsai, W.: Visual cryptography for gray-level images by dithering techniques, Pattern Recognition Letters, 24, 2003, 349-358.
- [7] Nakajima, M., Yamaguchi, Y.: Extended visual cryptography for natural images, Journal of WSCG, 10(2), 2002, 303-310.
- [8] Naor, M., Shamir, A.: Visual Cryptography, Advances in Cryptology, Eurpocrypt'94. Springer-Verlag, Berlin, 1995, 1-12.
- [9] Rivest, R. L.: The MD5 message digest algorithm, Internet Network Working Group RFC 1321, April 1992.
- [10] Shamir, A.: How to share a secret, Communication of the ACM, 22(11), 1979, 612-613.
- [11] Shyu, S. J.: Efficient visual secret sharing scheme for color images, Pattern Recognition, 39(5), 2006, 866- 880.
- [12] Thien, C., Lin, J.: Secret image sharing, Computers & Graphics, 26(5), 2002, 765-770.
- [13] Viet, D., Kurosawa, K.: Almost ideal contrast visual cryptography with reversing, Lecture Notes in Comput. Sci., 2964, Springer, Berlin, 2004, 353-365.
- [14] Wu, Y. S., Thien, C. C., Lin, J. C.: Sharing and hiding secret images with size constraint, Pattern Recognition, 37(7), 2004, 1377-1385.
Typ dokumentu
Bibliografia
Identyfikatory
Identyfikator YADDA
bwmeta1.element.baztech-article-BUS5-0018-0023