On the Semantic Security of Secret Image Sharing Methods

被引:5
|
作者
Bhadravati, Shreelatha [1 ]
Khabbazian, Majid [2 ]
Atrey, Pradeep K. [1 ]
机构
[1] Univ Winnipeg, Dept Appl Comp Sci, Winnipeg, MB R3B 2E9, Canada
[2] Univ Alberta, Dept Elect & Comp Engn, Edmonton, AB, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Secret image sharing; Cryptanalysis; Semantic security;
D O I
10.1109/ICSC.2013.58
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this work, we analyze some of the existing secret image sharing methods and show that they do not possess semantic security, a property of many secure systems. We propose a new method based on the threshold secret sharing scheme for images in the compressed and uncompressed domains. Our method generates minimal share sizes with similar computational cost to previous methods, yet it is computationally secure and satisfies the semantic security property.
引用
收藏
页码:302 / 305
页数:4
相关论文
共 50 条
  • [1] Security Analysis of Secret Image Sharing
    Yan, Xuehu
    Lu, Yuliang
    Liu, Lintao
    Wan, Song
    Ding, Wanmeng
    Liu, Hanlin
    DATA SCIENCE, PT 1, 2017, 727 : 305 - 316
  • [2] Security analysis and classification of image secret sharing
    Yan, Xuehu
    Liu, Lintao
    Lu, Yuliang
    Gong, Qinghong
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 47 : 208 - 216
  • [3] Progressive Secret Image Sharing Scheme Based on Semantic Segmentation
    Zhang, Lina
    Zheng, Xiangqin
    Liu, Ying
    IEEE ACCESS, 2020, 8 : 173289 - 173297
  • [5] XOR Based Secret Image Sharing Scheme with Security Improvement
    Ratnam, Javvaji V. K.
    Reddy, T. Sreenivasulu
    Reddy, P. Ramana
    HELIX, 2018, 8 (05): : 3588 - 3592
  • [6] Secret Cracking and Security Enhancement for the Image Application of CRT-Based Secret Sharing
    Wang, Rui
    Li, Longlong
    Yang, Guozheng
    Yan, Xuehu
    Yan, Wei
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 9819 - 9834
  • [7] Enhanced semantic visual secret sharing scheme for the secure image communication
    Blesswin, John A.
    Raj, Christhu
    Sukumaran, Rajeev
    Mary, Selva G.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (23-24) : 17057 - 17079
  • [8] Relations Between Secret Sharing and Secret Image Sharing
    Yan, Xuehu
    Li, Jinming
    Lu, Yuliang
    Liu, Lintao
    Yang, Guozheng
    Chen, Huixian
    SECURITY WITH INTELLIGENT COMPUTING AND BIG-DATA SERVICES, 2020, 895 : 79 - 93
  • [9] Secret image sharing
    Thien, CC
    Lin, JC
    COMPUTERS & GRAPHICS-UK, 2002, 26 (05): : 766 - 770
  • [10] Medical Image Security with Cheater Identification Using Secret Sharing Scheme
    Krishnan, Arun
    Das, Manik Lal
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SIGNAL, NETWORKS, COMPUTING, AND SYSTEMS (ICSNCS 2016), VOL 1, 2017, 395 : 117 - 126