Sharing secret image using section encoding

被引:0
|
作者
Tso, H-K [1 ]
机构
[1] Army Acad ROC, Dept Elect Engn, Chungli 320, Taoyuan, Taiwan
来源
IMAGING SCIENCE JOURNAL | 2010年 / 58卷 / 01期
关键词
secret sharing; encoding; pixel expansion; half-tone image; information security;
D O I
10.1179/136821909X12581187859899
中图分类号
TB8 [摄影技术];
学科分类号
0804 ;
摘要
In recent years, many techniques of secret sharing have been proposed successively. Although these schemes have provided further protection for digital images, some problems follow it, including meaningless and enlarged sharing images and lossy reconstructed image. Meaningless sharing images will attract enemy attention easily. Enlarged images will occupy more storage space of protector. Furthermore, lossy reconstructed image will cause misjudgement of authorized owner easily. Based on the three issues, an improved secret sharing scheme using section encoding is proposed in this paper. Experimental results show that the proposed method overcomes the disadvantages of meaningless and enlarged sharing images; besides, the reconstructed secret image becomes lossless.
引用
收藏
页码:32 / 36
页数:5
相关论文
共 50 条
  • [1] Efficient Image Secret Sharing Using Parallel Processing for Row-Wise Encoding and Decoding
    Patil, Sonali D.
    INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND APPLICATIONS, ICICA 2016, 2018, 632 : 207 - 214
  • [2] Secured secret sharing technique based on chaotic map and DNA encoding with application on secret image
    Naskar, P. K.
    Chaudhuri, A.
    IMAGING SCIENCE JOURNAL, 2016, 64 (08): : 460 - 470
  • [3] Secret image sharing using eigenvalues and eigenvectors
    Sirisha, B. Lakshmi
    Kumar, S. Srinivas
    Mohan, B. Chandra
    JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2018, 39 (04): : 871 - 878
  • [4] Secret Image Sharing Using Multiwavelet Transform
    Huang, Chin-Pan
    Li, Ching-Chung
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2011, 27 (02) : 733 - 748
  • [5] Relations Between Secret Sharing and Secret Image Sharing
    Yan, Xuehu
    Li, Jinming
    Lu, Yuliang
    Liu, Lintao
    Yang, Guozheng
    Chen, Huixian
    SECURITY WITH INTELLIGENT COMPUTING AND BIG-DATA SERVICES, 2020, 895 : 79 - 93
  • [6] Secret image sharing using quadratic residues
    Chen, Chang-Chu
    Chang, Chin-Chen
    2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL 1, PROCEEDINGS, 2007, : 515 - 518
  • [7] Secret image sharing
    Thien, CC
    Lin, JC
    COMPUTERS & GRAPHICS-UK, 2002, 26 (05): : 766 - 770
  • [8] Improved Secret Image Sharing Method By Encoding Shared Values With Authentication Bits
    Ulutas, Guzin
    Ulutas, Mustafa
    Nabiyev, Vasif
    COMPUTER AND INFORMATION SCIENCES II, 2012, : 331 - 335
  • [9] Sharing a verifiable secret image using two shadows
    Chang, Chin-Chen
    Lin, Chia-Chen
    Le, T. Hoang Ngan
    Le, Hoai Bac
    PATTERN RECOGNITION, 2009, 42 (11) : 3097 - 3114
  • [10] Ideal contrast secret image sharing using reversing
    Zhang, Hai-Bo
    Wang, Xiao-Fei
    Xu, Hai-Qiao
    Huang, You-Peng
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2010, 38 (02): : 465 - 468