Abstract
In (k, n) threshold secret image sharing (TSIS), a secret image is shared into n shadow images. Any k or more shadow images can be collaborated together to reconstruct the secret image, while less than k shadow images cannot reveal any secret. All shadow images have the same importance in reconstruction process. In some applications, some participants are accorded special privileges due to their status or importance. In this paper, we consider the (t, s, k, n) essential TSIS (ETSIS) scheme. All n shadows in the proposed (t, s, k, n)-ETSIS scheme are classified into s essential shadows and (n–s) non-essential shadows. In reconstruction, we needs k shadow images with at least t essential shadow images.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Blakley, G.R.: Safeguarding Cryptographic Keys. In: Proceedings of the AFIPS 1979 National Computer Conference, vol. 48, pp. 313–317. AFIPS Press (1979)
Shamir, A.: How to Share A Secret. Communications of the Association for Computing Machinery 22, 612–613 (1979)
Thien, C.C., Lin, J.C.: Secret Image Sharing. Computer & Graphics 26, 765–770 (2002)
Lin, C.C., Tsai, W.H.: Secret Image Sharing with Steganography and Authentication. Journal of Systems & Software 73, 405–414 (2004)
Yang, C.N., Chen, T.S., Yu, K.H., Wang, C.C.: Improvements of Image Sharing with Steganography and Authentication. Journal of Systems & Software 80, 1070–1076 (2007)
Chang, C.C., Hsieh, Y.P., Lin, C.H.: Sharing Secrets in Stego Images with Authentication. Pattern Recognition 41, 3130–3137 (2008)
Yang, C.N., Ouyang, J.F., Harn, L.: Steganography and Authentication in Image Sharing without Parity Bits. Optics Communications 285, 1725–1735 (2012)
Wang, R.Z., Shyu, S.J.: Scalable Secret Image Sharing. Signal Processing: Image Communication 22, 363–373 (2007)
Yang, C.N., Huang, S.M.: Constructions and Properties of k out of n Scalable Secret Image Sharing. Optics Communications 283, 1750–1762 (2010)
Yang, C.N., Chu, Y.Y.: A General (k, n) Scalable Secret Image Sharing Scheme with the Smooth Scalability. Journal of Systems & Software 84, 1726–1733 (2011)
Lin, Y.Y., Wang, R.Z.: Scalable Secret Image Sharing With Smaller Shadow Images. IEEE Signal Processing Letters 17, 316–319 (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yang, CN., Wu, CC. (2013). A Threshold Secret Image Sharing with Essential Shadow Images. In: Pan, JS., Yang, CN., Lin, CC. (eds) Advances in Intelligent Systems and Applications - Volume 2. Smart Innovation, Systems and Technologies, vol 21. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35473-1_17
Download citation
DOI: https://doi.org/10.1007/978-3-642-35473-1_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35472-4
Online ISBN: 978-3-642-35473-1
eBook Packages: EngineeringEngineering (R0)