research-article
- Authors:
- Hai-yang Ding College of Information Engineering, Beijing Institute of Graphic Communication, Beijing, China and Information Security Center, Beijing University of Posts and Telecommunications, Beijing, China
College of Information Engineering, Beijing Institute of Graphic Communication, Beijing, China and Information Security Center, Beijing University of Posts and Telecommunications, Beijing, China
View Profile
- Run-dong Yang College of Information Engineering, Beijing Institute of Graphic Communication, Beijing, China
College of Information Engineering, Beijing Institute of Graphic Communication, Beijing, China
View Profile
- Jie Shi College of Information Engineering, Beijing Institute of Graphic Communication, Beijing, China
College of Information Engineering, Beijing Institute of Graphic Communication, Beijing, China
View Profile
- Pei-fei Song College of Information Engineering, Beijing Institute of Graphic Communication, Beijing, China
College of Information Engineering, Beijing Institute of Graphic Communication, Beijing, China
View Profile
ICMSSP '18: Proceedings of the 3rd International Conference on Multimedia Systems and Signal ProcessingApril 2018Pages 17–23https://doi.org/10.1145/3220162.3220169
- 0citation
- 113
- Downloads
Metrics
Total Citations0Total Downloads113Last 12 Months6
Last 6 weeks1
- Get Citation Alerts
New Citation Alert added!
This alert has been successfully added and will be sent to:
You will be notified whenever a record that you have chosen has been cited.
To manage your alert preferences, click on the button below.
Manage my Alerts
New Citation Alert!
Please log in to your account
- Publisher Site
- Get Access
ICMSSP '18: Proceedings of the 3rd International Conference on Multimedia Systems and Signal Processing
A (k,n) Visual Cryptography Based on Shamir's Secret Sharing
Pages 17–23
PreviousChapterNextChapter
ABSTRACT
This paper proposes a (k,n) visual cryptography based on Shamir's secret sharing (VCSSS). Using Shamir's secret sharing, a binary secret image can be shared into n meaningless shares, in order to make the generated shares more like noise images, adding the randomness within the process of sharing. Picking any k shares from n meaningless shares, the secret image can be revealed by using Lagrange interpolation. The main contribution of this paper is that applying Shamir's secret sharing to realize a (k,n) visual cryptography, and this method neither requires code book nor suffers from pixel expansion. Experimental results show VCSSS can realize a (k,n) visual cryptography, and correct decoding rate (CDR) of revealed secret image can be guaranteed.
References
- Naor, M., Shamir, A. Visual Cryptography{J}. In: De Santis, A. (ed.) EUROCRYPT, 1994. LNCS, vol. 950, pp. 1--12. Springer, Heidelberg (1995)Google Scholar
- Ateniese, G., Blundo, C., De Santis, A., Stinson, D.: Visual cryptography for general access structures{J}. Inf. Comput. 129(2), 86--106 (1996) Google Scholar
Digital Library
- Liu, F., Wu, C., Lin, X. Step construction of visual cryptography schemes{J}. IEEETrans. Inf. Forensics Secur. 5(1), 27--38 (2010) Google Scholar
Digital Library
- Ateniese, G., Blundo, C., Santis, A., Stinson, D. Extended capabilities for visual cryptography{J}. Theor. Comput. Sci. 250(1-2), 143--161 (2001) Google Scholar
Digital Library
- Young-Chang Hou, Zen-Yu Quan, and Hsin-Yin Liao. New Designs for Friendly Visual Cryptography Scheme{J}. International Journal of Information and Electronics Engineering, Vol. 5, No. 1, January 2015Google Scholar
- Kafri, O., Keren, E. Encryption of pictures and shapes by random grids{J}. Opt.Lett. 12(6), 377--379 (1987)Google Scholar
Cross Ref
- Shyu, S. Image encryption by random grids. Pattern Recogn{J}. 40(3), 1014--1031(2007) Google Scholar
Digital Library
- Shyu, S. Image encryption by multiple random grids. Pattern Recogn{J}. 42(7), 1582--1596 (2009) Google Scholar
Digital Library
- Chen, T., Tsao, K. Visual secret sharing by random grids revisited{J}. PatternRecogn. 42(9), 2203--2217 (2009) Google Scholar
Digital Library
- Chen, T., Tsao, K. Threshold visual secret sharing by random grids{J}. J. Syst. Softw.84, 1197--1208 (2011) Google Scholar
Digital Library
- Wu, X., Sun, W. Random grid-based visual secret sharing for general access structures with cheat-preventing ability{J}. J. Syst. Softw. 85(5), 1119--1134 (2011) Google Scholar
Digital Library
- Wu, X., Sun, W. Visual secret sharing for general access structures by randomgrids{J}. IET Inf. Secur. 6(4), 299--309 (2012)Google Scholar
Cross Ref
- Duanhao Ou, Xiaotian Wu, Lu Dai, and Wei Sun. Improved Tagged Visual Cryptograms by Using Random Grids{J}. IWDW 2013, LNCS 8389, pp. 79--94, 2014.Google Scholar
- Hou, Y.C., Quan, Z.Y., Tsai, C.F., Tseng, A.Y. Block-based progressive visual secretsharing{J}. Inf. Sci. 233, 290--340 (2013) Google Scholar
Digital Library
- Young-Chang Hou, Zen-Yu Quan, Chih-Fong Tsai and A-Yu Tseng. Cheating Immune Block-Based ProgressiveVisual Cryptography{J}. The International Workshop on Digital-Forensics and Watermarking 2013, LNCS 8389, pp. 95--108, 2014.Google Scholar
- Rituraj Roy, Sayantani Bandyopadhyay, Shyamalendu Kandar, Bibhas Chandra Dhara. A Novel 3-4 Image Secret Sharing Scheme{C}. In Proceedings of 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI). pp: 2072--2075. 2015Google Scholar
- Adi Shamir. How to Share a Secret{J}.Communications of the ACM, 1979, 22(11): 612--613 Google Scholar
Digital Library
Cited By
View all
Index Terms
A (k,n) Visual Cryptography Based on Shamir's Secret Sharing
Security and privacy
Security services
Digital rights management
Recommendations
- Improvements of a two-in-one image secret sharing scheme based on gray mixing model
Yang and Ciou recently proposed a two-in-one image secret sharing scheme (TiOISSS), which can easily preview a vague image by human eyes, but also provide a perfect reconstruction of the original image by computation. However, their scheme cannot ...
Read More
- Randomness in secret sharing and visual cryptography schemes
Secret sharing schemes allow a secret to be shared among a group of participants so that only qualified subsets of participants can recover the secret. A visual cryptography scheme (VCS) is a special kind of secret sharing scheme in which the secret to ...
Read More
- Secret sharing and visual cryptography schemes
Sec '01: Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
A secret sharing scheme is a method for sharing a secret among a set p of p participants. The secret is encoded into n pieces called shares each of which is given to a distinct participant. Certain qualified subsets of participants can recover the ...
Read More
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in
Full Access
Get this Publication
- Information
- Contributors
Published in
ICMSSP '18: Proceedings of the 3rd International Conference on Multimedia Systems and Signal Processing
April 2018
168 pages
ISBN:9781450364577
DOI:10.1145/3220162
Copyright © 2018 ACM
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [emailprotected]
Sponsors
In-Cooperation
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
- Published: 28 April 2018
Permissions
Request permissions about this article.
Author Tags
- (k
- Lagrange interpolation
- Shamir's secret sharing
- n) visual cryptography
Qualifiers
- research-article
- Research
- Refereed limited
Conference
Funding Sources
Other Metrics
View Article Metrics
- Bibliometrics
- Citations0
Article Metrics
- View Citations
Total Citations
113
Total Downloads
- Downloads (Last 12 months)6
- Downloads (Last 6 weeks)1
Other Metrics
View Author Metrics
Cited By
This publication has not been cited yet
PDF Format
View or Download as a PDF file.
eReader
View online with eReader.
eReader
Digital Edition
View this article in digital edition.
View Digital Edition
- Figures
- Other
Close Figure Viewer
Browse AllReturn
Caption
View Table of Contents
Export Citations
Your Search Results Download Request
We are preparing your search results for download ...
We will inform you here when the file is ready.
Download now!
Your Search Results Download Request
Your file of search results citations is now ready.
Download now!
Your Search Results Download Request
Your search export query has expired. Please try again.