location: Current position: Home >> Scientific Research >> Paper Publications

(t, n) Threshold secret image sharing scheme with adversary structure

Hits:

Indexed by:期刊论文

Date of Publication:2017-10-01

Journal:MULTIMEDIA TOOLS AND APPLICATIONS

Included Journals:Scopus、SCIE、EI

Volume:76

Issue:20

Page Number:21193-21210

ISSN No.:1380-7501

Key Words:Adversary structure; Secret image sharing; (t, n) threshold; Distortion free

Abstract:Secret image sharing has been researched intensively, and it has emerged as an alternative to data hiding for protecting the security and privacy of important data. In the traditional (t, n) threshold secret image sharing schemes, any t or more shadow images can reconstruct the shared secret image. However, in real applications, (t, n) threshold access structures cannot meet all of the requirements, such as the adversary structure, which means that unauthorized groups of participants cannot reconstruct the shared secret. Thus, in (t, n) threshold secret sharing with adversary structure, t participants who want to reconstruct the secret cannot do so if they happen to belong to the defined adversary structure. This novel characteristic has the potential to work in many applications. However, the existing secret image sharing mechanisms cannot achieve the adversary structure. To solve this problem, we proposed a secret image sharing scheme that can achieve the adversary structure. In addition, our scheme also is a (t, n) threshold secret image sharing scheme. That is, t or more shadow images can be used to reconstruct the secret image, but some subsets that contain at least t shadow images among the adversary structures cannot reconstruct the secret image. The experimental results showed that the validity of our scheme is satisfactory.

Pre One:A new prediction model of infectious diseases with vaccination strategies based on evolutionary game theory

Next One:A novel green software evaluation model for cloud robotics