Cryptography Reference
In-Depth Information
Wang et al.'s method-2 was (( 2 ) 8 ) m 2
= ( 2 ) 4m 2
only, where there were 4m 2
8
=
m 2
2 blocks in total in the stego-image.The summary comparisons are shown
in Table 15.4.
TABLE 15.4
PSNR comparisons with the Lin-Tsai scheme.
High
Techniques used
Probability of cheating
capacity
in authentications
(Numerical analysis)
Thien-Lin scheme [8]
YES
N/A
N/A
Lin-Tsai scheme [4]
N/A
Parity bit check
N/A
(1/2) m 2
Yang et al. scheme [12]
N/A
Hash Function
(1/2) 4m 2
Wang et al. scheme [10] YES
CRC and Hash fuction
15.6 Conclusions
In this chapter, we introduce some polynomial-based image sharing schemes
as well as our proposed scheme. These image sharing schemes are based on
the (t;n)-threshold scheme to share the secret image to n participants. Some-
times, some authentication approaches and steganographic approaches were
applied. Algorithms, such as IPLA, RAHA, SEDA, and TSIRA, were incor-
porated into our scheme; the RAHA and IPLA were applied [8, 11], aiming
to guarantee higher capacity, and SEDA and TSIRA were used to enable the
robust authentication requirement, to reveal the original target secret image.
Compared to some other studies [4, 8, 12], Wang et al.'s scheme behaved bet-
ter in the terms of capacity with secret embedding in a stego-image and in
detection/authentication to block offers of fake shares.
Bibliography
[1] G. R. Blakley. Safeguarding cryptographic keys. In Proceedings of the
National Computer Conference, volume 48, pages 313{317. AFIPS Press,
1979.
[2] C.-C., Chang, C.-L., Lin, and H. Chou. Perfect hashing schemes for min-
ing traversal patterns. Fundamenta Informaticae, 70:185{202, November
2005.
 
 
Search WWH ::




Custom Search