A hybrid scheme for enhancing recovered image quality in polynomial based secret image sharing by modify-and-recalculate strategy

Journal of Information Security and Applications - Tập 51 - Trang 102452 - 2020
Xiaotian Wu1, Ching-Nung Yang2, Yi-Yun Yang2
1Department of Computer Science, Jinan University, Guangzhou, China
2Department of Computer Science and Information Engineering, National Dong Hwa University, Taiwan, China

Tài liệu tham khảo

Shamir, 1979, How to share a secret, Communications of the ACM, 22, 612, 10.1145/359168.359176 Blakley, 1979, Safeguarding cryptographic keys, 88 Naor, 1995, Visual cryptography, Lect Notes Comput Sci, 950, 1 Yang, 2004, New visual secret sharing schemes using probabilistic method, Pattern Recognition Letters, 25, 486, 10.1016/j.patrec.2003.12.011 Weir, 2010, A comprehensive study of visual cryptography, 70 Liu, 2010, Step construction of visual cryptography schemes, Inf Forensics Secur IEEE Trans, 5, 27, 10.1109/TIFS.2009.2037660 Chen, 2011, Threshold visual secret sharing by random grids, J Syst Softw, 84, 1197, 10.1016/j.jss.2011.02.023 Wang, 2013, Optimal contrast grayscale visual cryptography schemes with reversing, IEEE Trans Inf Forensics Secur, 8, 2059, 10.1109/TIFS.2013.2281108 Wu, 2014, Extended capabilities for XOR-based visual cryptography, IEEE Trans Inf Forensics Secur, 9, 1592, 10.1109/TIFS.2014.2346014 Yan, 2017, Contrast-improved visual secret sharing based on random grid for general access structure, Digit Signal Process, 71, 36, 10.1016/j.dsp.2017.08.006 Jia, 2018, Collaborative visual cryptography schemes, IEEE Trans Circt Syst Video Technol, 28, 1056, 10.1109/TCSVT.2016.2631404 Jia, 2018, An efficient XOR-based verifiable visual cryptographic scheme, Multimed Tools Appl, 1 Wu, 2019, Random grid based color visual cryptography scheme for black and white secret images with general access structures, Signal Process, 75, 100 Thien, 2002, Secret image sharing, Comput Graph, 26, 765, 10.1016/S0097-8493(02)00131-0 Thien, 2003, An image-sharing method with user-friendly shadow images, IEEE TransCirct SystVideo Technol, 13, 1161 Lin, 2004, Secret image sharing with steganography and authentication, J SystSoftw, 73, 405 Wang, 2006, Secret image sharing with smaller shadow images, Pattern Recognit Lett, 27, 551, 10.1016/j.patrec.2005.09.021 Yang, 2010, Constructions and properties of k out of n scalable secret image sharing, Opt Commun, 283, 1750, 10.1016/j.optcom.2009.12.077 Yang, 2015, Reducing shadow size in essential secret image sharing by conjunctive hierarchical approach, Signal Process, 31, 1 Ghebleh, 2017, A novel secret image sharing scheme using large primes, Multimed Tools Appl, 1 Kanso, 2017, An efficient (t, n)–threshold secret image sharing scheme, Multimed Tools Appl, 76, 16369, 10.1007/s11042-016-3917-x Liu, 2017, Scalable secret image sharing scheme with essential shadows, Signal Process, 58, 49 Wu, 2018, Improving recovered image quality in secret image sharing by simple modular arithmetic, Signal Process, 66, 42 Liu, 2018, Progressive (k, n) secret image sharing schemes based on boolean operations and covering codes, Signal Process, 66, 77 Wu, 2019, Invertible secret image sharing with steganography and authentication for AMBTC compressed images, Signal Process, 78, 437 Yan, 2019, A general progressive secret image sharing construction method, Signal Process, 71, 66 Wu, 2019, A combination of color-black-and-white visual cryptography and polynomial based secret image sharing, J Vis Commun Image Represent, 61, 74, 10.1016/j.jvcir.2019.03.020 Meghrajani, 2019, Secure and efficient arithmetic-based multi-secret image sharing scheme using universal share, J Inf Secur Appl, 47, 267 Kabirirad, 2019, Improvement of (n, n)-multi-secret image sharing schemes based on boolean operations, J Inf Secur Appl, 47, 16 Hu, 2019, A progressively essential secret image sharing scheme using hierarchy shadow, J Inf Secur Appl, 47, 371 Yan, 2019, Security analysis and classification of image secret sharing, J Inf Secur Appl, 47, 208 Zhao, 2009, A new image secret sharing scheme to identify cheaters, Computer Standards & Interfaces, 31, 252, 10.1016/j.csi.2007.10.012 Yang, 2007, Improvements of image sharing with steganography and authentication, Journal of Systems and Software, 80, 1070, 10.1016/j.jss.2006.11.022 Lin, 2007, VCPSS: a two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches, Pattern Recognit, 40, 3652, 10.1016/j.patcog.2007.04.001 Lin, 2010, Scalable secret image sharing with smaller shadow images, IEEE Signal Process Lett, 17, 316, 10.1109/LSP.2009.2038113 Yang, 2010, Image secret sharing method with two-decoding-options: lossless recovery and previewing capability, Image Vis Comput, 28, 1600, 10.1016/j.imavis.2010.04.003 Yang, 2011, A general (k, n) scalable secret image sharing scheme with the smooth scalability, J Syst Softw, 84, 1726, 10.1016/j.jss.2011.05.008 Yang, 2012, Steganography and authentication in image sharing without parity bits, Opt Commun, 285, 1725, 10.1016/j.optcom.2011.12.003 Li, 2013, Essential secret image sharing scheme with different importance of shadows, J Vis Commun Image Represent, 24, 1106, 10.1016/j.jvcir.2013.07.005 Chen, 2016, Two-layered structure for optimally essential secret image sharing scheme, J Vis Commun Image Represent, 38, 595, 10.1016/j.jvcir.2016.04.004 Srividhya, 2016, Implementation of tiOISSS with meaningful shadows and with an additional authentication image, J Vis Commun Image Represent, 38, 284, 10.1016/j.jvcir.2016.03.012 Wu, 2019, Partial reversible AMBTC-based secret image sharing with steganography, Digit Signal Process, 93, 22, 10.1016/j.dsp.2019.06.016