Cryptography Reference
In-Depth Information
In this experiment, the participants can decrypt and recover all the shared
secret information in all parts of the sub-shadows without being blocked. In
the next experiment, we assume that the participants can only reveal the
first secret image of the reconstructed image. The scheme arranges the sub-
shadows of the first secret image in the fixed locations according to the gen-
erated random sequences, and randomly disperses the other sub-shadows on
all planes. The final two shadows are shown in Fig. 4.14(a) and Fig. 4.14(b),
respectively. The scheme, then, performs the decryption process to decrypt
the shadows and reconstruct the secret image. The reconstructed image is
shown in Fig. 4.14(c).
Fig. 4.14. The (2, 2)-VSS scheme on the input image.
In Fig. 4.14(c), only the information in the first sub-region can be ob-
tained. This constraint can increase the complexity and enhance the security
of the secret information. The sub-shadows in each plane can also be randomly
arranged in different position, so that the participants can obtain different
parts of information in certain sub-regions by adopting the rotation and the
reversion operations.
In the third experiment, we assume that the participants can reveal three
secret images of the reconstructed image. The five shadows required are shown
in Figures 4.15(a)(e). The reconstructed image is shown in Fig. 4.15(f).
Search WWH ::




Custom Search