2020
DOI: 10.3390/math8061018
|View full text |Cite
|
Sign up to set email alerts
|

Lossless and Efficient Secret Image Sharing Based on Matrix Theory Modulo 256

Abstract: Most of today’s secret image sharing (SIS) schemes are based on Shamir’s polynomial-based secret sharing (SS), which cannot recover pixels larger than 250. Many exiting methods of lossless recovery are not perfect, because several problems arise, such as large computational costs, pixel expansion and uneven pixel distribution of shadow image. In order to solve these problems and achieve perfect lossless recovery and efficiency, we propose a scheme based on matrix theory modulo 256, which satisfies ( k , k … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 27 publications
0
3
0
Order By: Relevance
“…Yu et al [19] proposed an SIS scheme modulo 256, which is not limited to the restriction that the modulo (denoted by p) of the traditional SS scheme must be a prime number, and making the shared value space correspond perfectly to the range of grayscale image pixel values. Tey frst construct an n × k sharing matrix K, which satisfes the determinant of any k × k submatrix is odd.…”
Section: Secret Sharing Based On Matrixmentioning
confidence: 99%
“…Yu et al [19] proposed an SIS scheme modulo 256, which is not limited to the restriction that the modulo (denoted by p) of the traditional SS scheme must be a prime number, and making the shared value space correspond perfectly to the range of grayscale image pixel values. Tey frst construct an n × k sharing matrix K, which satisfes the determinant of any k × k submatrix is odd.…”
Section: Secret Sharing Based On Matrixmentioning
confidence: 99%
“…In recent years, researchers have proposed more SIS schemes, including schemes for color images [12,13], progressive decoding [14,15], meaningful shares [16], and minimizing pixel expansion [17,18], etc. In addition, there exist novel SIS schemes based on various theorems, like matrix theory [19], non-full rank linear model [20] and natural steganography (NS) [21]. More methods of steganography and multimedia security [22,23] are given in these years.…”
Section: Introductionmentioning
confidence: 99%
“…To put it briefly, the current methods for restoring images without loss have issues like spreading of pixels, an uneven distribution of pixels in shadow images, and a significant amount of computational expenses. The issue of lossless recovery has been addressed by Long Yu and his team [30] through the utilization of matrix computations in modulo 256. However, their approach necessitates a matrix multiplication for every shadow image pixel value, resulting in a significant amount of computations required for shadow image calculation.…”
mentioning
confidence: 99%