On Secret Multiple Image Sharing

نویسندگان

  • Shyong Jian Shyu
  • Ying-Ru Chen
چکیده

In traditional secret sharing schemes for general access structures, a secret can be encoded into n sets of (shadow, key)’s which are distributed to n participants one by one. Only those participants belonging to a pre-defined qualified subset can recover the shared secret by using their (shadow, key)’s. The size of (shadow, key)’s may be different for different participants. This problem exists when the traditional secret sharing schemes are adopted to cope with the sharing of multiple secret images for general access structures. Specifically, one participants may hold more than one set of (shadow, key)’s. In this paper, we design a new multiple secret images sharing scheme for both of the r out of n threshold and general access structures. Our scheme produces n keys with a constant size, which are distributed to the n participants, and some shadows which are stored in public. Each participant in our scheme holds only a constant-size key. The burden for each participant to carry one or more shadow(s) in traditional secret multiple images sharing schemes can be removed

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Computationally secure multiple secret sharing: models, schemes, and formal security analysis

A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...

متن کامل

Security Analysis of a Hash-Based Secret Sharing Scheme

Secret sharing schemes perform an important role in protecting se-cret by sharing it among multiple participants. In 1979, (t; n) threshold secret sharing schemes were proposed by Shamir and Blakley independently. In a (t; n) threshold secret sharing scheme a secret can be shared among n partic-ipants such that t or more participants can reconstruct the secret, but it can not be reconstructed b...

متن کامل

A Visual Cryptography based system for sharing multiple secret images

A Visual Cryptography (VC)-based system for sharing multiple secret images is proposed. Several weighted transparencies are generated so that people can reveal multiple secret images by stacking qualified subsets of some transparencies together. The transparency with relatively larger weight decides which secret image will be revealed. The proposed method has the following characteristics: deco...

متن کامل

Lossless Reconstruction of Secret Image Using Threshold Secret Sharing and Transformation

This paper is proposed to provide confidentiality of the secret image which can be used by multiple users or to store on multiple servers. A secret sharing is a technique to protect the secret information which will be used by multiple users. The threshold secret sharing is more efficient as it is possible to reconstruct the secret with the threshold number of shares. Along with Shamir’s secret...

متن کامل

Sharing a Verifiable Secret Image using Forward Error Correction Code for Halftone Image

A novel verifiable secret sharing method for Verifiable secret sharing (VSS) in halftone image based on linear block code with a parity check matrix is proposed. The proposed method, which not only verifies a secret image but also introduces multiple shadows for multiple users. The proposed method adopts forward error correction code (FEC) strategy based on property of linear block codes. There...

متن کامل

A Novel Method for the Construction of Threshold Multiple-secret Visual Cryptographic Schemes by without Pixel Expansion

The main concept of the original visual secret sharing (VSS) scheme is to encrypt a secret image into n meaningless share images. It cannot leak any information of the shared secret by any combination of the n share images except for all of images. The shared secret image can be revealed by printing the share images on transparencies and stacking the transparencies directly, so that the human v...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008