Cryptography Reference
In-Depth Information
15
Polynomial -Based Image Sharing
Shiuh-Jeng Wang
Central Police University, Taiwan
Chen-Hsing Yang
National Pingtung University of Education, Taiwan
Yu-Ting Chen
Central Police University, Taiwan
CONTENTS
15.1
Introduction :::::::::::::::::::::::::::::::::::::::::::::::::::::: 404
15.2
Polynomial-Based Sharing Scheme :::::::::::::::::::::::::::::: 405
15.2.1
Shamir's Secret Sharing Scheme :::::::::::::::::::::::: 405
15.2.2
Lagrange Interpolation Scheme ::::::::::::::::::::::::: 406
15.3
Preliminaries and Related Works :::::::::::::::::::::::::::::::: 407
15.3.1
Thien-Lin Scheme ::::::::::::::::::::::::::::::::::::::: 407
15.3.2
Lin-Tsai Scheme ::::::::::::::::::::::::::::::::::::::::: 407
15.3.3
Yang et al.'s Scheme ::::::::::::::::::::::::::::::::::::: 409
15.3.4
Inverted Pattern LSB Scheme ::::::::::::::::::::::::::: 409
15.3.5
Scalable Secret Image Sharing ::::::::::::::::::::::::::: 410
15.4
Wang et al.'s Scheme :::::::::::::::::::::::::::::::::::::::::::: 412
15.4.1
Secret Image Sharing :::::::::::::::::::::::::::::::::::: 412
15.4.2
Set-Up Authentication ::::::::::::::::::::::::::::::::::: 414
15.4.3
Main Algorithms ::::::::::::::::::::::::::::::::::::::::: 416
15.5
Experimental Results :::::::::::::::::::::::::::::::::::::::::::: 418
15.5.1
Fidelity Analysis ::::::::::::::::::::::::::::::::::::::::: 418
15.5.2
Evaluating Authentication :::::::::::::::::::::::::::::: 419
15.6
Conclusions ::::::::::::::::::::::::::::::::::::::::::::::::::::::: 423
Bibliography :::::::::::::::::::::::::::::::::::::::::::::::::::::::: 423
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Search WWH ::




Custom Search