Skip to main content

Image Secret Sharing

  • Reference work entry
  • 104 Accesses

Synonyms

Visual cryptography; Secret image

Definition

Among numerous cryptographic solutions proposed in the past few years, secret sharing schemes have been found sufficiently secure to facilitate distributed trust and shared control in various communication applications.

Introduction

Digital rights management systems are used to protect intellectual property rights of Digital media itself or secure its transmission over untrusted communication channels [13]. The required protection is achieved by employing either cryptography or Steganography. Steganography hides the secret message inside a cover signal producing its stego-version with an imperceivable difference from the original cover, whereas Cryptography alters the meaningless of the secret message through its encryption Necessitating the use of a decryption key to recover the original content.

Among numerous cryptographic solutions proposed in the past few years, secret sharing schemes have been found sufficiently secure to...

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   449.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. M. Barni and F. Bartolini, “Data Hiding for Fighting Piracy,” IEEE Signal Processing Magazine, Vol. 21, No. 2, March 2004, pp. 28–39.

    Article  Google Scholar 

  2. R. Lukac and K.-N. Plataniotis, “Bit-Level Based Secret Sharing for Image Encryption,” Pattern Recognition, Vol. 38, No. 5, May 2005, pp. 767–772.

    Article  Google Scholar 

  3. E.-T. Lin, A.M. Eskicioglu, R.-L. Lagendijk, and E.-D. Delp, “Advances in Digital Video Content Protection,” Proceedings of the IEEE, Vol. 93, No. 1, January 2005, pp. 171–183.

    Article  Google Scholar 

  4. A.-M. Eskicioglu, E.-J. Delp, and M.-R. Eskicioglu, “New Channels for Carrying Copyright and Usage Rights Data in Digital Multimedia Distribution,” Proceedings of the International Conference on Information Technology: Research and Education (ITRE'03), August 2003, pp. 94–98.

    Google Scholar 

  5. E.-D. Karnin, J.-W. Greene, and M.-E. Hellman, “On Secret Sharing Systems,” IEEE Transactions on Information Theory, Vol. 29, No. 1, January 1983, pp. 35–41.

    Article  MathSciNet  Google Scholar 

  6. A. Biemel and B. Chor, “Secret Sharing with Public Reconstruction,” IEEE Transactions on Information Theory, Vol. 44, No. 5, September 1998, pp. 1887–1896.

    Google Scholar 

  7. R. Lukac and K.-N. Plataniotis, “Colour Image Secret Sharing,” IEE Electronics Letters, Vol. 40, No. 9, April 2004, pp. 529–530.

    Article  Google Scholar 

  8. R. Lukac and K.-N. Plataniotis, “A New Encryption Scheme for Color Images,” Computing and Informatics, submitted.

    Google Scholar 

  9. C.-S. Tsai, C.-C. Chang, and T.-S. Chen, “Sharing Multiple Secrets in Digital Images,” Journal of Systems and Software, Vol.64, No.2, 2002, pp. 163–170.

    Article  Google Scholar 

  10. C.-C. Chang and J.-C. Chuang, “An Image Intellectual Property Protection Scheme for Gray-Level Images Using Visual Secret Sharing Strategy,” Pattern Recognition Letters, Vol. 23, No. 8, June 2002, pp. 931–941.

    Article  Google Scholar 

  11. P.-A. Eisen and D.-R. Stinson, “Threshold Visual Cryptography Schemes with Specified Levels of Reconstructed Pixels,” Design, Codes and Cryptography, Vol. 25, No.1, January 2002, pp. 15–61.

    Article  MathSciNet  Google Scholar 

  12. E.-R. Verheul and H.-C.-A. Van Tilborg, “Constructions and Properties of k out of n Visual Secret Sharing Schemes,” Designs, Codes and Cryptography, Vol. 11, No. 2, May 1997, pp. 179–196.

    Article  MathSciNet  Google Scholar 

  13. G. Ateniese, C. Blundo, A. de Santis, and D.-G. Stinson, “Visual Cryptography for General Access Structures,” Information and Computation, Vol. 129, No. 2, September 1996, pp. 86–106.

    Article  MathSciNet  Google Scholar 

  14. R. Lukac and K.-N. Plataniotis, “A Cost-Effective Private-Key Cryptosystem for Color Image Encryption,” Lecture Notes in Computer Science, Vol. 3514, May 2005, pp. 679–686.

    Article  Google Scholar 

  15. M. Naor and A. Shamir, “Visual Cryptography,” Proceedings of EUROCRYPT'94, Lecture Notes in Computer Science, Vol. 950, 1994, pp. 1–12.

    Article  MathSciNet  Google Scholar 

  16. C.-N. Yang, “New Visual Secret Sharing Schemes Using Probabilistic Method,” Pattern Recognition Letters, Vol. 25, No. 4, March 2004, pp. 481–494.

    Article  Google Scholar 

  17. C.-N. Yang and T.-S. Chen, “Aspect Ratio Invariant Visual Secret Sharing Schemes with Minimum Pixel Expansion,” Pattern Recognition Letters, Vol. 26, No. 2, January 2005, pp.193–206.

    Article  Google Scholar 

  18. C.-N. Yang and T.-S. Chen, “Size-Adjustable Visual Secret Sharing Schemes,” IEICE Transactions on Fundamentals, Vol. E88-A, No. 9, September 2005, pp. 2471–2474.

    Article  Google Scholar 

  19. H. Yamamoto, Y. Hayasaki, and N. Nishida, “Securing Information Display by Use of Visual Cryptography,” Optics Letters, Vol. 28, No. 17, September 2003, pp. 1564–1566.

    Article  Google Scholar 

  20. R. Lukac and K.-N. Plataniotis, “Image Representation Based Secret Sharing,” Communications of the CCISA (Chinese Cryptology Information Security Association), Special Issue on Visual Secret Sharing, Vol. 6, April 2005.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag

About this entry

Cite this entry

Lukac, R., Plataniotis, K.N., Yang, CN. (2008). Image Secret Sharing. In: Furht, B. (eds) Encyclopedia of Multimedia. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-78414-4_82

Download citation

Publish with us

Policies and ethics