Visual Secret Sharing of Color Image Using Extended Asmuth Bloom Technique

被引:0
|
作者
Anbarasi, L. Jani [1 ]
Mala, G. S. Anadha [2 ]
Prassana, D. R. L. [3 ]
机构
[1] Sri Ramakrishna Inst Technol, Coimbatore, Tamil Nadu, India
[2] Easwari Coll Engn, Madras, Tamil Nadu, India
[3] Vasavi Coll Engn, Hyderabad, Andhra Pradesh, India
来源
COMPUTATIONAL INTELLIGENCE IN DATA MINING, VOL 3 | 2015年 / 33卷
关键词
Image processing; Asmuth bloom technique; Secret sharing;
D O I
10.1007/978-81-322-2202-6_50
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Secret image sharing is the technique for securing images that involves the distribution of secret image into several shadow images. Secret sharing for color image is proposed in this article using Asmuth bloom technique which is further extended for accurate reconstruction of given original image. The secret image is reduced in pixel value using a quantization factor resulting in quantized secret image and a difference image. Secret shares based on Asmuth Bloom scheme are generated from the quantized secrets and are distributed among n participants specified at least t of them should gather to reveal the difference secret image and therefore the respective quantized image. The original secret is reconstructed using the inverse quantization process.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Threshold cryptography based on asmuth-bloom secret sharing
    Kaya, Kamer
    Selcuk, Ali Aydin
    Tezcan, Zahir
    COMPUTER AND INFORMATION SCIENCES - ISCIS 2006, PROCEEDINGS, 2006, 4263 : 935 - +
  • [2] Threshold cryptography based on Asmuth-Bloom secret sharing
    Kaya, Kamer
    Selcuk, Ali Aydin
    INFORMATION SCIENCES, 2007, 177 (19) : 4148 - 4160
  • [3] Secret Information Sharing Using Extended Color Visual Cryptography
    Sharma, Shivam
    Modi, Shivam
    Sharma, Akanksha
    COMPUTING AND NETWORK SUSTAINABILITY, 2017, 12 : 403 - 412
  • [4] On the asymptotic idealness of the Asmuth-Bloom threshold secret sharing scheme
    Dragan, Constantin Catalin
    Tiplea, Ferucio Laurentiu
    INFORMATION SCIENCES, 2018, 463 : 75 - 85
  • [5] The Image Watermarking Technique Using Visual Secret Sharing Strategy
    Huang, Shu-Chien
    Wang, Chu-Fu
    ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 2, PROCEEDINGS, 2008, : 190 - 195
  • [6] A secure data outsourcing scheme based on Asmuth-Bloom secret sharing
    Muhammad, Yusuf Idris
    Kaiiali, Mustafa
    Habbal, Adib
    Wazan, A. S.
    Ilyasu, Auwal Sani
    ENTERPRISE INFORMATION SYSTEMS, 2016, 10 (09) : 1001 - 1023
  • [7] Extended color visual cryptography for black and white secret image
    Yang, Ching-Nung
    Sun, Li-Zhe
    Cai, Song-Ruei
    THEORETICAL COMPUTER SCIENCE, 2016, 609 : 143 - 161
  • [8] Extended visual secret sharing schemes: Improving the shadow image quality
    Yang, Ching-Nung
    Chen, Tse-Shih
    INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2007, 21 (05) : 879 - 898
  • [9] A Review on Visual Secret Sharing Schemes for Binary, Gray & Color Image
    Panchbhai, Vishal V.
    Varade, Suchita W.
    BIOSCIENCE BIOTECHNOLOGY RESEARCH COMMUNICATIONS, 2020, 13 (14): : 268 - 272
  • [10] Visual secret sharing schemes for color images using halftoning
    Prakash, N. Krishna
    Govindaraju, S.
    ICCIMA 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND MULTIMEDIA APPLICATIONS, VOL III, PROCEEDINGS, 2007, : 174 - +