2014
DOI: 10.1016/j.ins.2014.07.016
|View full text |Cite
|
Sign up to set email alerts
|

Distortionless visual multi-secret sharing based on random grid

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(5 citation statements)
references
References 22 publications
0
5
0
Order By: Relevance
“…Subsequently, many SIS schemes were proposed in the past decades. They focus on using different hiding methods to improve the efficiency of sharing [37]- [39], studying the degree of dependence on trusted third-party [40], and the flexibility and robustness of restoring images [38], [41].After carefully reviewing these references, the comprehensive comparison between the proposed scheme and the related SIS schemes are demonstrated in Table I. Note that, although all the above SIS schemes can protect the secret image from being obtained by the others without enough shadows, they cannot prevent the shadow images from being tampered and corrupted in communication networks, which will cause the secret image cannot be exactly restored.…”
Section: A Secret Image Sharingmentioning
confidence: 99%
See 1 more Smart Citation
“…Subsequently, many SIS schemes were proposed in the past decades. They focus on using different hiding methods to improve the efficiency of sharing [37]- [39], studying the degree of dependence on trusted third-party [40], and the flexibility and robustness of restoring images [38], [41].After carefully reviewing these references, the comprehensive comparison between the proposed scheme and the related SIS schemes are demonstrated in Table I. Note that, although all the above SIS schemes can protect the secret image from being obtained by the others without enough shadows, they cannot prevent the shadow images from being tampered and corrupted in communication networks, which will cause the secret image cannot be exactly restored.…”
Section: A Secret Image Sharingmentioning
confidence: 99%
“…The above approaches have demonstrated the security and effectiveness of blockchain techniques in wireless network environment, which inspire us to propose the blockchain-based secure and efficient secret image sharing with outsourcing computation in wireless networks. Compared with the traditional secret sharing schemes without blockchain [41], [53]- [57]], our scheme has the following unique advantages in terms of the security performance. (1) Anti-tampering ability to verify the validity of the data [58]- [60], (2) the transparency of allowing nodes in the network to obtain information [61], [62], and (3) the interactivity of multi-party security cooperation without a third-party organization [63]- [65].…”
Section: B Blockchain Technologiesmentioning
confidence: 99%
“…A secret image and n cover images are encoded in n share images in such a way that the stacking of all n share images will reveal the secret image while from any less than n share images, no information can be revealed. Lin et al [11] proposed a novel random grid based MSIS scheme. Secrets images are encoded into two pie shared images and it can be decoded by stacking one pie share on another at different angle of rotation.…”
Section: Related Workmentioning
confidence: 99%
“…By taking practicality into account, many variations of the main VSS scheme have been presented by various authors for encryption of halftone [4,6,7,8,9,18], grayscale [15] and colored images [13,18]. These papers demonstrate that increasing the carrying capacity of secrets affects the contrast and distortion of decrypted secret.…”
Section: Algorithm 1: Random_grid_algorithmmentioning
confidence: 99%