Distortion free geometry based secret image sharing
نویسندگان
چکیده
منابع مشابه
A Geometry-Based Secret Image Sharing Approach
A (k, n) secret image sharing method shares a protected image in n shared images and the protected image can be reconstructed by k shared images. This study solves the secret image sharing problem by a geometry secret sharing strategy named the Blakley scheme. The protected image is first partitioned into non-overlapping sets of k pixels. Each set of k pixels forms a point under a k-dimensional...
متن کاملImprovements in Geometry-Based Secret Image Sharing Approach with Steganography
Protection of the sensitive data is an important issue because of the fast development of applications that need exchange of the secret information over the Internet. Secret sharing is an idea proposed by Shamir and Blakley separately with different implementations in 1979. Lin and Tsai proposed a method that uses Steganography to create meaningful shares by using Shamir’s secret sharing scheme...
متن کاملRandom Matrices Based Image Secret Sharing
This paper presents an image secret sharing method based on some random matrices that acts as a key for secret sharing. The technique allows a secret image to be divided into four image shares with each share individually looks meaningless. To reconstruct the secret image all four shares have to be used. Any subset m (1< m ≤ 4) shares cannot get sufficient information to reveal th e secret imag...
متن کاملVisual Secret Sharing Based Digital Image Watermarking
In this paper, a spatial domain image watermarking technique based on Visual Secret Sharing (VSS) and unique statistical properties is proposed. A random looking image is generated during watermark hiding process and is secretly registered with an arbitrator for verification during conflicts. Another random looking image is generated during watermark revelation stage and is combined with the ex...
متن کاملSecret Image Sharing based on Wavelet Transform
Visual cryptography is a secure technique enable distributing sensitive visual data to participant through public communication channels. In visual cryptography a secret image is cryptographically encrypted into some shares (transparencies) such that the generated secure shares do not reveal any information without they are not combined in prescribed way. The main challenges facing secure image...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Procedia Computer Science
سال: 2011
ISSN: 1877-0509
DOI: 10.1016/j.procs.2010.12.119