2018
DOI: 10.1109/access.2018.2811722
|View full text |Cite
|
Sign up to set email alerts
|

Secret Image Sharing Based on Encrypted Pixels

Abstract: The well-known Thien and Lin's (k, n) secret image sharing (SIS) scheme and its extended versions are threshold schemes, in which a secret image is shared among n shadow images and it can be recovered from any k shadow images. To reduce the size of shadow image, in those schemes, secret image pixels are embedded in all coefficients of (k −1)-degree polynomial to generate the shadows. Also, the secret pixels are permuted before the sharing to address the residual-image problem on shadow images. Due to the above… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
12
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
9
1

Relationship

2
8

Authors

Journals

citations
Cited by 40 publications
(12 citation statements)
references
References 14 publications
0
12
0
Order By: Relevance
“…Therefore, when adopting basic logic operations on VCS, the operations should be pixel-wise and cannot definitely be bit-wise since basic logic operations on bit-level need the help of computer and image manipulation program. Such bit-based secret image sharing methods [27] will need the help of computer even though only simple computations are required. Because VCS uses pixel-wise operation, the secret image I should be black-and-white (binary), where each pixel is either 1 or 0.…”
Section: Motivationmentioning
confidence: 99%
“…Therefore, when adopting basic logic operations on VCS, the operations should be pixel-wise and cannot definitely be bit-wise since basic logic operations on bit-level need the help of computer and image manipulation program. Such bit-based secret image sharing methods [27] will need the help of computer even though only simple computations are required. Because VCS uses pixel-wise operation, the secret image I should be black-and-white (binary), where each pixel is either 1 or 0.…”
Section: Motivationmentioning
confidence: 99%
“…For the dealer nonparticipatory decryption, when a participant exchanges the share with any other k − 1 participants, the participant decrypts the secret with good quality by Lagrange interpolation. After Shamir's work, many works [26]- [29] developed improved polynomial-based ISS schemes to obtain desirable properties. Polynomial-based ISS is significant because the decrypted secret image has no pixel expansion and high quality.…”
Section: Introductionmentioning
confidence: 99%
“…[10] proposed a new (t, s, k, n)-ESIS scheme based on Shamir's scheme, where essential shadows are more important than non-essential shadows. In addition, shadow images with diferent priorities [11][12][13][14][15].Thus, Shamir's polynomial-based scheme has been widely used in SIS [16][17][18].…”
Section: Introductionmentioning
confidence: 99%