Secret sharing (SS) for (k, n) threshold generates secret data into n shadows, where any k or more shadows can reconstruct the secret while any k-1 or less shadows reconstruct nothing of the secret. SS is useful for cloud computing security, block chain security and so on. Since nowadays image covers more information, secret image sharing (SIS) is studied widely. Although most SIS principles are derived from SS and SIS belongs to SS, SIS has its specific features comparing to SS due to image characteristics, such as, pixel value range, region relationship and so on. In this paper, first we discuss the relations between SIS and SS, where differences between them are mainly considered. Then, some typical sharing principles are employed to further indicate the differences and analyze the possible ways to deal with the issues when directly applying SS to SIS. Finally, we perform experiments to verify our analyses.
CITATION STYLE
Yan, X., Li, J., Lu, Y., Liu, L., Yang, G., & Chen, H. (2020). Relations Between Secret Sharing and Secret Image Sharing. In Advances in Intelligent Systems and Computing (Vol. 895, pp. 79–93). Springer Verlag. https://doi.org/10.1007/978-3-030-16946-6_7
Mendeley helps you to discover research relevant for your work.