A (k,n) Visual Cryptography Based on Shamir's Secret Sharing | Proceedings of the 3rd International Conference on Multimedia Systems and Signal Processing (2024)

A (k,n) Visual Cryptography Based on Shamir's Secret Sharing | Proceedings of the 3rd International Conference on Multimedia Systems and Signal Processing (2)

Advanced Search

icmssp

research-article

  • Authors:
  • Hai-yang Ding College of Information Engineering, Beijing Institute of Graphic Communication, Beijing, China and Information Security Center, Beijing University of Posts and Telecommunications, Beijing, China

    College of Information Engineering, Beijing Institute of Graphic Communication, Beijing, China and Information Security Center, Beijing University of Posts and Telecommunications, Beijing, China

    View Profile

    ,
  • Run-dong Yang College of Information Engineering, Beijing Institute of Graphic Communication, Beijing, China

    College of Information Engineering, Beijing Institute of Graphic Communication, Beijing, China

    View Profile

    ,
  • Jie Shi College of Information Engineering, Beijing Institute of Graphic Communication, Beijing, China

    College of Information Engineering, Beijing Institute of Graphic Communication, Beijing, China

    View Profile

    ,
  • Pei-fei Song College of Information Engineering, Beijing Institute of Graphic Communication, Beijing, China

    College of Information Engineering, Beijing Institute of Graphic Communication, Beijing, China

    View Profile

ICMSSP '18: Proceedings of the 3rd International Conference on Multimedia Systems and Signal ProcessingApril 2018Pages 17–23https://doi.org/10.1145/3220162.3220169

Published:28 April 2018Publication HistoryA (k,n) Visual Cryptography Based on Shamir's Secret Sharing | Proceedings of the 3rd International Conference on Multimedia Systems and Signal Processing (3)

  • 0citation
  • 113
  • Downloads

Metrics

Total Citations0Total Downloads113

Last 12 Months6

Last 6 weeks1

  • Get Citation Alerts

    New Citation Alert added!

    This alert has been successfully added and will be sent to:

    You will be notified whenever a record that you have chosen has been cited.

    To manage your alert preferences, click on the button below.

    Manage my Alerts

    New Citation Alert!

    Please log in to your account

  • Publisher Site
  • Get Access

ICMSSP '18: Proceedings of the 3rd International Conference on Multimedia Systems and Signal Processing

A (k,n) Visual Cryptography Based on Shamir's Secret Sharing

Pages 17–23

PreviousChapterNextChapter

A (k,n) Visual Cryptography Based on Shamir's Secret Sharing | Proceedings of the 3rd International Conference on Multimedia Systems and Signal Processing (4)

ABSTRACT

This paper proposes a (k,n) visual cryptography based on Shamir's secret sharing (VCSSS). Using Shamir's secret sharing, a binary secret image can be shared into n meaningless shares, in order to make the generated shares more like noise images, adding the randomness within the process of sharing. Picking any k shares from n meaningless shares, the secret image can be revealed by using Lagrange interpolation. The main contribution of this paper is that applying Shamir's secret sharing to realize a (k,n) visual cryptography, and this method neither requires code book nor suffers from pixel expansion. Experimental results show VCSSS can realize a (k,n) visual cryptography, and correct decoding rate (CDR) of revealed secret image can be guaranteed.

References

  1. Naor, M., Shamir, A. Visual Cryptography{J}. In: De Santis, A. (ed.) EUROCRYPT, 1994. LNCS, vol. 950, pp. 1--12. Springer, Heidelberg (1995)Google ScholarA (k,n) Visual Cryptography Based on Shamir's Secret Sharing | Proceedings of the 3rd International Conference on Multimedia Systems and Signal Processing (5)
  2. Ateniese, G., Blundo, C., De Santis, A., Stinson, D.: Visual cryptography for general access structures{J}. Inf. Comput. 129(2), 86--106 (1996) Google ScholarA (k,n) Visual Cryptography Based on Shamir's Secret Sharing | Proceedings of the 3rd International Conference on Multimedia Systems and Signal Processing (6)Digital Library
  3. Liu, F., Wu, C., Lin, X. Step construction of visual cryptography schemes{J}. IEEETrans. Inf. Forensics Secur. 5(1), 27--38 (2010) Google ScholarA (k,n) Visual Cryptography Based on Shamir's Secret Sharing | Proceedings of the 3rd International Conference on Multimedia Systems and Signal Processing (8)Digital Library
  4. Ateniese, G., Blundo, C., Santis, A., Stinson, D. Extended capabilities for visual cryptography{J}. Theor. Comput. Sci. 250(1-2), 143--161 (2001) Google ScholarA (k,n) Visual Cryptography Based on Shamir's Secret Sharing | Proceedings of the 3rd International Conference on Multimedia Systems and Signal Processing (10)Digital Library
  5. Young-Chang Hou, Zen-Yu Quan, and Hsin-Yin Liao. New Designs for Friendly Visual Cryptography Scheme{J}. International Journal of Information and Electronics Engineering, Vol. 5, No. 1, January 2015Google ScholarA (k,n) Visual Cryptography Based on Shamir's Secret Sharing | Proceedings of the 3rd International Conference on Multimedia Systems and Signal Processing (12)
  6. Kafri, O., Keren, E. Encryption of pictures and shapes by random grids{J}. Opt.Lett. 12(6), 377--379 (1987)Google ScholarA (k,n) Visual Cryptography Based on Shamir's Secret Sharing | Proceedings of the 3rd International Conference on Multimedia Systems and Signal Processing (13)Cross Ref
  7. Shyu, S. Image encryption by random grids. Pattern Recogn{J}. 40(3), 1014--1031(2007) Google ScholarA (k,n) Visual Cryptography Based on Shamir's Secret Sharing | Proceedings of the 3rd International Conference on Multimedia Systems and Signal Processing (15)Digital Library
  8. Shyu, S. Image encryption by multiple random grids. Pattern Recogn{J}. 42(7), 1582--1596 (2009) Google ScholarA (k,n) Visual Cryptography Based on Shamir's Secret Sharing | Proceedings of the 3rd International Conference on Multimedia Systems and Signal Processing (17)Digital Library
  9. Chen, T., Tsao, K. Visual secret sharing by random grids revisited{J}. PatternRecogn. 42(9), 2203--2217 (2009) Google ScholarA (k,n) Visual Cryptography Based on Shamir's Secret Sharing | Proceedings of the 3rd International Conference on Multimedia Systems and Signal Processing (19)Digital Library
  10. Chen, T., Tsao, K. Threshold visual secret sharing by random grids{J}. J. Syst. Softw.84, 1197--1208 (2011) Google ScholarA (k,n) Visual Cryptography Based on Shamir's Secret Sharing | Proceedings of the 3rd International Conference on Multimedia Systems and Signal Processing (21)Digital Library
  11. Wu, X., Sun, W. Random grid-based visual secret sharing for general access structures with cheat-preventing ability{J}. J. Syst. Softw. 85(5), 1119--1134 (2011) Google ScholarA (k,n) Visual Cryptography Based on Shamir's Secret Sharing | Proceedings of the 3rd International Conference on Multimedia Systems and Signal Processing (23)Digital Library
  12. Wu, X., Sun, W. Visual secret sharing for general access structures by randomgrids{J}. IET Inf. Secur. 6(4), 299--309 (2012)Google ScholarA (k,n) Visual Cryptography Based on Shamir's Secret Sharing | Proceedings of the 3rd International Conference on Multimedia Systems and Signal Processing (25)Cross Ref
  13. Duanhao Ou, Xiaotian Wu, Lu Dai, and Wei Sun. Improved Tagged Visual Cryptograms by Using Random Grids{J}. IWDW 2013, LNCS 8389, pp. 79--94, 2014.Google ScholarA (k,n) Visual Cryptography Based on Shamir's Secret Sharing | Proceedings of the 3rd International Conference on Multimedia Systems and Signal Processing (27)
  14. Hou, Y.C., Quan, Z.Y., Tsai, C.F., Tseng, A.Y. Block-based progressive visual secretsharing{J}. Inf. Sci. 233, 290--340 (2013) Google ScholarA (k,n) Visual Cryptography Based on Shamir's Secret Sharing | Proceedings of the 3rd International Conference on Multimedia Systems and Signal Processing (28)Digital Library
  15. Young-Chang Hou, Zen-Yu Quan, Chih-Fong Tsai and A-Yu Tseng. Cheating Immune Block-Based ProgressiveVisual Cryptography{J}. The International Workshop on Digital-Forensics and Watermarking 2013, LNCS 8389, pp. 95--108, 2014.Google ScholarA (k,n) Visual Cryptography Based on Shamir's Secret Sharing | Proceedings of the 3rd International Conference on Multimedia Systems and Signal Processing (30)
  16. Rituraj Roy, Sayantani Bandyopadhyay, Shyamalendu Kandar, Bibhas Chandra Dhara. A Novel 3-4 Image Secret Sharing Scheme{C}. In Proceedings of 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI). pp: 2072--2075. 2015Google ScholarA (k,n) Visual Cryptography Based on Shamir's Secret Sharing | Proceedings of the 3rd International Conference on Multimedia Systems and Signal Processing (31)
  17. Adi Shamir. How to Share a Secret{J}.Communications of the ACM, 1979, 22(11): 612--613 Google ScholarA (k,n) Visual Cryptography Based on Shamir's Secret Sharing | Proceedings of the 3rd International Conference on Multimedia Systems and Signal Processing (32)Digital Library

Cited By

View all

A (k,n) Visual Cryptography Based on Shamir's Secret Sharing | Proceedings of the 3rd International Conference on Multimedia Systems and Signal Processing (34)

    Index Terms

    1. A (k,n) Visual Cryptography Based on Shamir's Secret Sharing

      1. Security and privacy

        1. Security services

          1. Digital rights management

      Recommendations

      • Improvements of a two-in-one image secret sharing scheme based on gray mixing model

        Yang and Ciou recently proposed a two-in-one image secret sharing scheme (TiOISSS), which can easily preview a vague image by human eyes, but also provide a perfect reconstruction of the original image by computation. However, their scheme cannot ...

        Read More

      • Randomness in secret sharing and visual cryptography schemes

        Secret sharing schemes allow a secret to be shared among a group of participants so that only qualified subsets of participants can recover the secret. A visual cryptography scheme (VCS) is a special kind of secret sharing scheme in which the secret to ...

        Read More

      • Secret sharing and visual cryptography schemes

        Sec '01: Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge

        A secret sharing scheme is a method for sharing a secret among a set p of p participants. The secret is encoded into n pieces called shares each of which is given to a distinct participant. Certain qualified subsets of participants can recover the ...

        Read More

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      Get this Publication

      • Information
      • Contributors
      • Published in

        A (k,n) Visual Cryptography Based on Shamir's Secret Sharing | Proceedings of the 3rd International Conference on Multimedia Systems and Signal Processing (35)

        ICMSSP '18: Proceedings of the 3rd International Conference on Multimedia Systems and Signal Processing

        April 2018

        168 pages

        ISBN:9781450364577

        DOI:10.1145/3220162

        Copyright © 2018 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [emailprotected]

        Sponsors

          In-Cooperation

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 28 April 2018

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            A (k,n) Visual Cryptography Based on Shamir's Secret Sharing | Proceedings of the 3rd International Conference on Multimedia Systems and Signal Processing (36)

            Author Tags

            • (k
            • Lagrange interpolation
            • Shamir's secret sharing
            • n) visual cryptography

            Qualifiers

            • research-article
            • Research
            • Refereed limited

            Conference

            Funding Sources

            • A (k,n) Visual Cryptography Based on Shamir's Secret Sharing | Proceedings of the 3rd International Conference on Multimedia Systems and Signal Processing (37)

              Other Metrics

              View Article Metrics

            • Bibliometrics
            • Citations0
            • Article Metrics

              • Total Citations

                View Citations
              • 113

                Total Downloads

              • Downloads (Last 12 months)6
              • Downloads (Last 6 weeks)1

              Other Metrics

              View Author Metrics

            • Cited By

              This publication has not been cited yet

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            Digital Edition

            View this article in digital edition.

            View Digital Edition

            • Figures
            • Other

              Close Figure Viewer

              Browse AllReturn

              Caption

              View Table of Contents

              Export Citations

                Your Search Results Download Request

                We are preparing your search results for download ...

                We will inform you here when the file is ready.

                Download now!

                Your Search Results Download Request

                Your file of search results citations is now ready.

                Download now!

                Your Search Results Download Request

                Your search export query has expired. Please try again.

                A (k,n) Visual Cryptography Based on Shamir's Secret Sharing | Proceedings of the 3rd International Conference on Multimedia Systems and Signal Processing (2024)
                Top Articles
                Latest Posts
                Article information

                Author: Carmelo Roob

                Last Updated:

                Views: 6026

                Rating: 4.4 / 5 (45 voted)

                Reviews: 84% of readers found this page helpful

                Author information

                Name: Carmelo Roob

                Birthday: 1995-01-09

                Address: Apt. 915 481 Sipes Cliff, New Gonzalobury, CO 80176

                Phone: +6773780339780

                Job: Sales Executive

                Hobby: Gaming, Jogging, Rugby, Video gaming, Handball, Ice skating, Web surfing

                Introduction: My name is Carmelo Roob, I am a modern, handsome, delightful, comfortable, attractive, vast, good person who loves writing and wants to share my knowledge and understanding with you.