2015
DOI: 10.1007/s11042-015-2885-x
|View full text |Cite
|
Sign up to set email alerts
|

A multi-threshold secret image sharing scheme based on the generalized Chinese reminder theorem

Abstract: In a multi-secret image sharing scheme, participants are able to share multiple secret images such the way that each secret image can be reconstructed according to the corresponding access structure. In this paper, employing Chan and Chang's multi-secret sharing, we propose a new multi-threshold secret image sharing scheme. In the secret image sharing process, based on the generalized CRT, secret values are produced according to the associated access structures. The shadow images can be generated by embedding … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(4 citation statements)
references
References 18 publications
0
4
0
Order By: Relevance
“…It can be seen that theR is a result of CRT on XOR-ed all secret images. The last form trivially tells that the recovered masking coefficientR as given in (20) is identical to that of the masking coefficient R as given in (18), i.e. R =R.…”
Section: Analysis Of Former Approachmentioning
confidence: 99%
“…It can be seen that theR is a result of CRT on XOR-ed all secret images. The last form trivially tells that the recovered masking coefficientR as given in (20) is identical to that of the masking coefficient R as given in (18), i.e. R =R.…”
Section: Analysis Of Former Approachmentioning
confidence: 99%
“…In addition to hierarchical schemes, many researchers have proposed various multi-secret image sharing schemes based on different technologies. For example, the Chinese remainder theorem [10], Boolean [27][28][29], and cellular automaton [30] have been proposed. In 2017, Yuan et al [31] first applied the adjustable threshold into secret image sharing, and they proposed the first adjustable-threshold secret image scheme.…”
Section: Related Workmentioning
confidence: 99%
“…Then, their scheme uses watermarking to provide the capability to verify shares, thereby preventing share spoofing attacks. Secret sharing can effectively ensure the security of secret information, but the traditional secret sharing schemes (e.g., [8][9][10][11][12]) cannot adjust the threshold value. However, in reality, the threshold value must be adjusted when the security policy or the adversary model changes.…”
Section: Introductionmentioning
confidence: 99%
“…In 2002, Thien and Lin [7] used Shamir's secret sharing scheme [1] to share a secret image. There are many types of (k, n) − SIS schemes, such as progressive SIS [6], multiple SIS [9], meaningful SIS [10,11], partial SIS [12], scalable SIS [13,14], adversary structure scheme [5], public access structure [11,15,16], fraud detection [17,18], SIS based on encrypted pixels [8] etc.…”
mentioning
confidence: 99%