2018
DOI: 10.3390/sym10100530
|View full text |Cite
|
Sign up to set email alerts
|

An Image Secret Sharing Method Based on Matrix Theory

Abstract: Most of today’s secret image sharing technologies are based on the polynomial-based secret sharing scheme proposed by shamir. At present, researchers mostly focus on the development of properties such as small shadow size and lossless recovery, instead of the principle of Shamir’s polynomial-based SS scheme. In this paper, matrix theory is used to analyze Shamir’s polynomial-based scheme, and a general (k, n) threshold secret image sharing scheme based on matrix theory is proposed. The effectiveness of the pro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
7
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
1
1

Relationship

3
6

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 18 publications
0
7
0
Order By: Relevance
“…In a secret image sharing setting, shares are often referred to as shadow images. A number of (t, n)-threshold secret image sharing schemes based on different techniques such as polynomial interpolation, hyperplane geometry, the Chinese remainder theorem, and matrix theory have been published by researchers [4][5][6][7][8][9][10][11][12][13][14][15][16][17][18]. Since these schemes do not possess the essentiality condition, all participants have the same importance in the reconstruction phase.…”
Section: Introductionmentioning
confidence: 99%
“…In a secret image sharing setting, shares are often referred to as shadow images. A number of (t, n)-threshold secret image sharing schemes based on different techniques such as polynomial interpolation, hyperplane geometry, the Chinese remainder theorem, and matrix theory have been published by researchers [4][5][6][7][8][9][10][11][12][13][14][15][16][17][18]. Since these schemes do not possess the essentiality condition, all participants have the same importance in the reconstruction phase.…”
Section: Introductionmentioning
confidence: 99%
“…However, 256 is not a prime number, and there is no guarantee that all elements in MS(256) have inverses, so Lagrange interpolation cannot be used in the recovery phase. Ding et al [23] proved that Shamir's sharing polynomial constructed by the Vandermonde matrix is only a special case of constructing a sharing polynomial satisfying (k, n) threshold, therefore, we design our method from a broader perspective based on matrix theory. In the sharing phase, a sharing matrix is generated by a filter operation, which is used to encrypt the secret image into n shadows.…”
Section: Introductionmentioning
confidence: 99%
“…Thus, the ISS technique has been applied to distributed storage in the cloud, block chain, digital watermarking, and access control [1][2][3][4]. Now the widely studied principles of ISS techniques include visual secret sharing (VSS), also known as, visual cryptography (VC) [4,5] and polynomial [6][7][8][9][10][11][12].…”
Section: Introductionmentioning
confidence: 99%