[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1877972.1877989acmconferencesArticle/Chapter ViewAbstractPublication PagesmmConference Proceedingsconference-collections
poster

Further improvements on secret image sharing scheme

Published: 29 October 2010 Publication History

Abstract

Secret image sharing technique has been widely researched in the past decade. This technique allows us to create the share images from a secret image in such a way that an individual share does not reveal any information about the secret image, however when a specified number of shares are brought together, they can be used to reconstruct the secret image. In this paper, we first point out the weaknesses of the existing secret image sharing methods proposed by Thien and Lin [8] and Alharthi and Atrey [1], and then propose a new method that overcomes these weaknesses. Thien and Lin [8] use a permutation step which leads to disclosure of the secret image if the permutation key is revealed. Alharthi and Atrey [1] suggested an improvement over Thien and Lin's method by removing the permutation step. However, their method has a limitation that the first few shares are not usable because of its similarity with the secret image. We propose further improvement over these two methods by repeatedly changing the value of share number using a modulo prime function. To show the superiority of our method over others, we present the security analysis and experimental results.

References

[1]
S. Alharthi and P. K. Atrey. An improved scheme for secret image sharing. In In IEEE ICME Workshop on Content Protection and Forensics, Singapore, July 2010.
[2]
L. Bai. A reliable (k, n) image secret sharing scheme. IEEE International Symposium on Dependable, Autonomic and Secure Computing, 0:31--36, 2006.
[3]
L. Bai. A strong ramp secret sharing scheme using matrix projection. In IEEE International Symposium on World of Wireless, Mobile and Multimedia Networks, pages 652--656, Washington, DC, USA, 2006.
[4]
H. Gorre. Entropy Measures and Unconditional Security in Cryptography, volume 1. Cachin Christian, 1997.
[5]
N. G. Parvatov. Perfect secret sharing schemes. Prikl. Diskr. Mat., (2):50 -- 57, 2008.
[6]
A. Shamir. How to share a secret. Commun. ACM, 22(11):612--613, 1979.
[7]
D. R. Stinson. Cryptography: Theory and Practice, 1st edition, Chap 11. CRC Press, Boca Raton, 1995.
[8]
C.-C. Thien and J.-C. Lin. Secret image sharing. Computers & Graphics, 26(5):765 -- 770, 2002.

Cited By

View all
  • (2019)Secret Image Sharing Over Cloud Using One-Dimensional Chaotic MapData, Engineering and Applications10.1007/978-981-13-6351-1_2(13-23)Online publication date: 24-Apr-2019
  • (2018)Just process me, without knowing meMultimedia Tools and Applications10.1007/s11042-017-4906-477:10(12581-12605)Online publication date: 1-May-2018
  • (2018)Robust Image Sharing Scheme Using One Dimensional Chaotic Logistic MapProceedings of 2nd International Conference on Computer Vision & Image Processing10.1007/978-981-10-7898-9_13(157-168)Online publication date: 5-May-2018
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
MiFor '10: Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence
October 2010
134 pages
ISBN:9781450301572
DOI:10.1145/1877972
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 29 October 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. image
  2. secret sharing

Qualifiers

  • Poster

Conference

MM '10
Sponsor:
MM '10: ACM Multimedia Conference
October 29, 2010
Firenze, Italy

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2019)Secret Image Sharing Over Cloud Using One-Dimensional Chaotic MapData, Engineering and Applications10.1007/978-981-13-6351-1_2(13-23)Online publication date: 24-Apr-2019
  • (2018)Just process me, without knowing meMultimedia Tools and Applications10.1007/s11042-017-4906-477:10(12581-12605)Online publication date: 1-May-2018
  • (2018)Robust Image Sharing Scheme Using One Dimensional Chaotic Logistic MapProceedings of 2nd International Conference on Computer Vision & Image Processing10.1007/978-981-10-7898-9_13(157-168)Online publication date: 5-May-2018
  • (2018)Accurate and reliable reversible data hiding using sequential encoding techniquesConcurrency and Computation: Practice and Experience10.1002/cpe.497931:14Online publication date: 29-Nov-2018
  • (2017)CryptFine: Towards secure cloud based filtering in encrypted domain2017 ISEA Asia Security and Privacy (ISEASP)10.1109/ISEASP.2017.7976985(1-8)Online publication date: Jan-2017
  • (2016)Don't see me, just filter meProceedings of the Tenth Indian Conference on Computer Vision, Graphics and Image Processing10.1145/3009977.3010036(1-8)Online publication date: 18-Dec-2016
  • (2016)Secure image sharing method over unsecured channelsMultimedia Tools and Applications10.1007/s11042-014-2404-575:4(2249-2274)Online publication date: 1-Feb-2016
  • (2015)Scaling and Cropping of Wavelet-Based Compressed Images in Hidden DomainMultiMedia Modeling10.1007/978-3-319-14445-0_37(430-441)Online publication date: 2015
  • (2014)Avoiding weak parameters in secret image sharing2014 IEEE Visual Communications and Image Processing Conference10.1109/VCIP.2014.7051617(506-509)Online publication date: Dec-2014
  • (2014)Collective control over sensitive video data using secret sharingMultimedia Tools and Applications10.1007/s11042-013-1644-073:3(1459-1486)Online publication date: 1-Dec-2014
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media