Cryptography Reference
In-Depth Information
17
Two-Decoding-Option Image Sharing
Method
Ching-Nung Yang
National Dong Hwa University, Taiwan
Chuei-Bang Ciou
National Dong Hwa University, Taiwan
Tse-Shih Chen
National Dong Hwa University, Taiwan
CONTENTS
17.1
Introduction :::::::::::::::::::::::::::::::::::::::::::::::::::::: 463
17.2
Preliminaries ::::::::::::::::::::::::::::::::::::::::::::::::::::: 465
17.2.1
PISSS :::::::::::::::::::::::::::::::::::::::::::::::::::: 465
17.2.2
VCS :::::::::::::::::::::::::::::::::::::::::::::::::::::: 466
17.3
Previous Works :::::::::::::::::::::::::::::::::::::::::::::::::: 467
17.3.1
Jin et al.'s TiOISSS ::::::::::::::::::::::::::::::::::::: 468
17.3.2
Lin and Lin's TiOISSS :::::::::::::::::::::::::::::::::: 468
17.4
A New (k;n)-TiOISSS ::::::::::::::::::::::::::::::::::::::::::: 470
17.4.1
Design Concept :::::::::::::::::::::::::::::::::::::::::: 471
17.4.2
The Lossless TiOISSS ::::::::::::::::::::::::::::::::::: 472
17.5
Experimental Results and Comparisons ::::::::::::::::::::::::: 478
17.6
Conclusion :::::::::::::::::::::::::::::::::::::::::::::::::::::::: 481
Bibliography :::::::::::::::::::::::::::::::::::::::::::::::::::::::: 484
17.1 Introduction
An image secret sharing scheme (ISSS) divides a secret image into some
shadow images (referred to as shadows) in a way that requires the shadows
in a certain privileged coalitions for the secret reconstruction. However, the
secret image cannot be revealed if they are not combined in the prescribed
way. A typical ISSS is often a (k, n)-threshold scheme, where k is the thresh-
old value to reveal the secret and n is the number of total shadows. One can
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Search WWH ::




Custom Search