郭成

个人信息Personal Information

教授

博士生导师

硕士生导师

主要任职:软件学院、大连理工大学-立命馆大学国际信息与软件学院副院长

性别:男

毕业院校:大连理工大学

学位:博士

所在单位:软件学院、国际信息与软件学院

学科:软件工程. 计算机应用技术

联系方式:guocheng@dlut.edu.cn

电子邮箱:guocheng@dlut.edu.cn

扫描关注

论文成果

当前位置: 中文主页 >> 科学研究 >> 论文成果

(t, n) Threshold secret image sharing scheme with adversary structure

点击次数:

论文类型:期刊论文

发表时间:2017-10-01

发表刊物:MULTIMEDIA TOOLS AND APPLICATIONS

收录刊物:Scopus、SCIE、EI

卷号:76

期号:20

页面范围:21193-21210

ISSN号:1380-7501

关键字:Adversary structure; Secret image sharing; (t, n) threshold; Distortion free

摘要:Secret image sharing has been researched intensively, and it has emerged as an alternative to data hiding for protecting the security and privacy of important data. In the traditional (t, n) threshold secret image sharing schemes, any t or more shadow images can reconstruct the shared secret image. However, in real applications, (t, n) threshold access structures cannot meet all of the requirements, such as the adversary structure, which means that unauthorized groups of participants cannot reconstruct the shared secret. Thus, in (t, n) threshold secret sharing with adversary structure, t participants who want to reconstruct the secret cannot do so if they happen to belong to the defined adversary structure. This novel characteristic has the potential to work in many applications. However, the existing secret image sharing mechanisms cannot achieve the adversary structure. To solve this problem, we proposed a secret image sharing scheme that can achieve the adversary structure. In addition, our scheme also is a (t, n) threshold secret image sharing scheme. That is, t or more shadow images can be used to reconstruct the secret image, but some subsets that contain at least t shadow images among the adversary structures cannot reconstruct the secret image. The experimental results showed that the validity of our scheme is satisfactory.