2015
DOI: 10.1002/sec.1233
|View full text |Cite
|
Sign up to set email alerts
|

A novel weighted threshold secret image sharing scheme

Abstract: In traditional secret image sharing schemes, the participants have the same status, and shadow images are of approximately equal importance, which cannot satisfy some special requirements in real situations. In this paper, we considered the problem of secret image sharing with the weighted threshold access structure, which means different participants can have different status and significance. With this approach, each shadow image has one weight, and the secret image can be reconstructed losslessly if, and on… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 25 publications
(63 reference statements)
0
2
0
Order By: Relevance
“…Many verifiable secret sharing schemes are proposed to solve the deception attack in secret sharing. The verifiable secret sharing scheme [Harn and Miao (2014); Li, Ma and Guo (2015)] increased the secret sharing process and improved the security of secret sharing. In order to increase the security and practicability of the scheme, many dynamic weighted secret sharing schemes are proposed [Wu and Tseng (2011); Harn and Lin (2010)].…”
Section: Related Workmentioning
confidence: 99%
“…Many verifiable secret sharing schemes are proposed to solve the deception attack in secret sharing. The verifiable secret sharing scheme [Harn and Miao (2014); Li, Ma and Guo (2015)] increased the secret sharing process and improved the security of secret sharing. In order to increase the security and practicability of the scheme, many dynamic weighted secret sharing schemes are proposed [Wu and Tseng (2011); Harn and Lin (2010)].…”
Section: Related Workmentioning
confidence: 99%
“…In the reconstruction phase, the secret image can be recovered only if the total weights of the collected shadows reach the pre-defined threshold. Afterwards, Chen et al [14], Li et al [15] and Lin et al [16] also improved the WSIS scheme in different ways. The HSIS scheme uses polynomial derivatives and Birkhoff interpolation to generate shadows with different priorities.…”
Section: Introductionmentioning
confidence: 99%