A Survey on Sharing Secret Image using NVSS Scheme
نویسندگان
چکیده
Secret sharing is of great importance for sharing secret or confidential information. This information can be in the form of documents, images, photographs and many more. Most of the previous visual secret sharing scheme uses shares to conceal secret images. The shares may be printed or in digital form. When the secret image is hidden into the shares, noise-like pixel appears which increase the risk of transmission. Attackers look at image having noise-like pixels with suspicion and try to intercept the image. Thus image having noise is not safe for transmission over network. Due to this transmission risk is involved in visual secret sharing. In order to overcome such problems some authors have presented another scheme known as Natural image based Visual Secret Sharing Scheme (NVSS Scheme). In this scheme the transmission of secret image occurs through different media in order to protect the secret. The n out of n NVSS scheme can transmit a digital secret image by randomly choosing n-1 natural images and one noise share. Natural images may be in digital or printed form. Noise-like share is produced by natural image and printed image. The natural shares which are unaltered minimize the risk associated during transmission.
منابع مشابه
An Efficient Threshold Verifiable Multi-Secret Sharing Scheme Using Generalized Jacobian of Elliptic Curves
In a (t,n)-threshold secret sharing scheme, a secret s is distributed among n participants such that any group of t or more participants can reconstruct the secret together, but no group of fewer than t participants can do. In this paper, we propose a verifiable (t,n)-threshold multi-secret sharing scheme based on Shao and Cao, and the intractability of the elliptic curve discrete logar...
متن کاملA Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions
A non-interactive (t,n)-publicly veriable secret sharing scheme (non-interactive (t,n)-PVSS scheme) is a (t,n)-secret sharing scheme in which anyone, not only the participants of the scheme, can verify the correctness of the produced shares without interacting with the dealer and participants. The (t,n)-PVSS schemes have found a lot of applications in cryptography because they are suitable for<...
متن کاملComputationally secure multiple secret sharing: models, schemes, and formal security analysis
A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...
متن کاملSharing several secrets based on Lagrange's interpolation formula and Cipher feedback mode
In a multi-secret sharing scheme, several secret values are distributed among a set of n participants.In 2000 Chien et al.'s proposed a (t; n) multi-secret sharing scheme. Many storages and publicvalues required in Chien's scheme. Motivated by these concerns, some new (t; n) multi-secret sharingschemes are proposed in this paper based on the Lagrange interpolation formula for polynomials andcip...
متن کاملOn the design and security of a lattice-based threshold secret sharing scheme
In this paper, we introduce a method of threshold secret sharing scheme (TSSS) in which secret reconstruction is based on Babai's nearest plane algorithm. In order to supply secure public channels for transmitting shares to parties, we need to ensure that there are no quantum threats to these channels. A solution to this problem can be utilization of lattice-based cryptosystems for these channe...
متن کامل