Sharing secret image using section encoding

被引:0
|
作者
Tso, H-K [1 ]
机构
[1] Army Acad ROC, Dept Elect Engn, Chungli 320, Taoyuan, Taiwan
来源
IMAGING SCIENCE JOURNAL | 2010年 / 58卷 / 01期
关键词
secret sharing; encoding; pixel expansion; half-tone image; information security;
D O I
10.1179/136821909X12581187859899
中图分类号
TB8 [摄影技术];
学科分类号
0804 ;
摘要
In recent years, many techniques of secret sharing have been proposed successively. Although these schemes have provided further protection for digital images, some problems follow it, including meaningless and enlarged sharing images and lossy reconstructed image. Meaningless sharing images will attract enemy attention easily. Enlarged images will occupy more storage space of protector. Furthermore, lossy reconstructed image will cause misjudgement of authorized owner easily. Based on the three issues, an improved secret sharing scheme using section encoding is proposed in this paper. Experimental results show that the proposed method overcomes the disadvantages of meaningless and enlarged sharing images; besides, the reconstructed secret image becomes lossless.
引用
收藏
页码:32 / 36
页数:5
相关论文
共 50 条
  • [31] Polynomial Approach in a Secret Image Sharing Using Quadratic Residue
    Ulutas, Guzin
    Nabiyev, Vasif V.
    Ulutas, Mustafa
    2009 24TH INTERNATIONAL SYMPOSIUM ON COMPUTER AND INFORMATION SCIENCES, 2009, : 584 - +
  • [32] A new approach of Secret Image Sharing using Verifiable Scheme
    Rao, Jyoti
    Venny, Priya
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 1134 - 1139
  • [33] Fast Comprehensive Secret Sharing using Naive Image Compression
    Prasetyo, Hen
    Prayuda, Kukuh Caezaocta
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (12) : 222 - 229
  • [34] AUTHENTICATION OF GRAYSCALE FORENSIC IMAGE USING VISUAL SECRET SHARING
    Joshi, Akshata M.
    Jadhav, Dhanashree M.
    Kazi, Nida A.
    Suryawanshi, Amol N.
    Katti, Jayashree
    2016 CONFERENCE ON EMERGING DEVICES AND SMART SYSTEMS (ICEDSS), 2016, : 56 - 60
  • [35] The Image Watermarking Technique Using Visual Secret Sharing Strategy
    Huang, Shu-Chien
    Wang, Chu-Fu
    ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 2, PROCEEDINGS, 2008, : 190 - 195
  • [36] Secret Image Sharing Using Steganography with Different Cover Images
    Jagadeesh, Noopa
    Nandakumar, Aishwarya
    Harmya, P.
    Anju, S. S.
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 2, 2011, 191 : 490 - 497
  • [37] A novel secret image sharing scheme using large primes
    Ghebleh, Mohammad
    Kanso, Ali
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (10) : 11903 - 11923
  • [38] Verifiable Image Secret Sharing in Matrix Projection Using Watermarking
    Patil, Sonali
    Deshmukh, Prashant
    2014 INTERNATIONAL CONFERENCE ON CIRCUITS, SYSTEMS, COMMUNICATION AND INFORMATION TECHNOLOGY APPLICATIONS (CSCITA), 2014, : 225 - 229
  • [39] Secret Image Sharing Using Pseudo-Random Sequence
    Kumar, Anil
    Rajpal, Navin
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (2B): : 185 - 193
  • [40] A secret image sharing method using integer multiwavelet transform
    Huang, Chin-Pan
    Li, Ching-Chung
    2006 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, ICIP 2006, PROCEEDINGS, 2006, : 1969 - +