Relations Between Secret Sharing and Secret Image Sharing

3Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Secret sharing (SS) for (k, n) threshold generates secret data into n shadows, where any k or more shadows can reconstruct the secret while any k-1 or less shadows reconstruct nothing of the secret. SS is useful for cloud computing security, block chain security and so on. Since nowadays image covers more information, secret image sharing (SIS) is studied widely. Although most SIS principles are derived from SS and SIS belongs to SS, SIS has its specific features comparing to SS due to image characteristics, such as, pixel value range, region relationship and so on. In this paper, first we discuss the relations between SIS and SS, where differences between them are mainly considered. Then, some typical sharing principles are employed to further indicate the differences and analyze the possible ways to deal with the issues when directly applying SS to SIS. Finally, we perform experiments to verify our analyses.

Cite

CITATION STYLE

APA

Yan, X., Li, J., Lu, Y., Liu, L., Yang, G., & Chen, H. (2020). Relations Between Secret Sharing and Secret Image Sharing. In Advances in Intelligent Systems and Computing (Vol. 895, pp. 79–93). Springer Verlag. https://doi.org/10.1007/978-3-030-16946-6_7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free