2021
DOI: 10.1109/tcsvt.2020.3025527
|View full text |Cite
|
Sign up to set email alerts
|

A Common Method of Share Authentication in Image Secret Sharing

Abstract: Because of the importance of digital images and their extensive application to digital watermarking, block chain, access control, identity authentication, distributive storage in the cloud and so on, image secret sharing (ISS) is attracting ever-increasing attention. Share authentication is an important issue in its practical application. However, most ISS schemes with share authentication ability require a dealer to participate in the authentication (namely, dealer participatory authentication). In this paper… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
16
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
3

Relationship

3
6

Authors

Journals

citations
Cited by 44 publications
(16 citation statements)
references
References 40 publications
0
16
0
Order By: Relevance
“…3 THE PROPOSED SCHEME [31], the PSIS technique is employed. Indeed, PSIS is derived from Shamir's secret sharing [18] in a prime field of p. In PSIS, k secret pixels are embedded into the k coefficients a…”
Section: Yang Et Al's (N N)-bmsismentioning
confidence: 99%
See 1 more Smart Citation
“…3 THE PROPOSED SCHEME [31], the PSIS technique is employed. Indeed, PSIS is derived from Shamir's secret sharing [18] in a prime field of p. In PSIS, k secret pixels are embedded into the k coefficients a…”
Section: Yang Et Al's (N N)-bmsismentioning
confidence: 99%
“…Yang and Yang [38] developed a TiOSIS with error correcting. Yan et al [31] exploited the authentication mechanism in PSIS. Indeed, their approach is a TiOSIS which utilizes the VCS decoding for authentication.…”
Section: Introductionmentioning
confidence: 99%
“…According to the implementation principle, the VCS can be divided into schemes based on the basis matrix [7] and the random grid [10]. In the VCS field, current researches focus on these areas, including improving the visual quality of reconstructed images [11,12], implementing general access structures [13,14], share authentication [15], and meaningful shadow images [16][17][18].…”
Section: Introductionmentioning
confidence: 99%
“…e secret image can be recovered by stacking shares, and when the computation device is available, we can also choose the XOR operation to recover the secret image in a lossless manner [4,5]. At present, the research on VC is mainly divided into basis matrix based [3,6,7] and random grid based [8][9][10]. However, the image quality recovered by this scheme is poor [11], so we choose a polynomial-based scheme as our scheme.…”
Section: Introductionmentioning
confidence: 99%