location: Current position: Home >> Scientific Research >> Paper Publications

A novel (n, t, n) secret image sharing scheme without a trusted third party

Hits:

Indexed by:期刊论文

Date of Publication:2014-10-01

Journal:MULTIMEDIA TOOLS AND APPLICATIONS

Included Journals:SCIE、EI

Volume:72

Issue:3

Page Number:2195-2209

ISSN No.:1380-7501

Key Words:(n, t, n) secret sharing; Modulo operator; Additive homomorphism; Secret image sharing; Trusted third party

Abstract:Secret image sharing is a technique to share a secret image among a set of n participants. A trusted third party embeds the secret image into the cover image to generate shadow images such that at least t or more shadow images can reconstruct the secret image. In this paper, we consider an extreme and real-world situation, in which there is no one who is trusted by anyone else. In the proposed scheme, the participants can act as a dealer and communicate with each other in a secret channel. Each participant can generate her/his own shadow image independently, according to the cover image and the secret image. Experimental results are provided to show that the shadow images have satisfactory quality. In addition, our scheme has a large embedding capacity, and the secret image can be reconstructed losslessly.

Pre One:A Reversible Steganography Scheme of Secret Image Sharing Based on Cellular Automata and Least Significant Bits Construction

Next One:Chaotic maps-based three-party authenticated key agreement protocol using smart cards