Sharing secret messages using meaningful digital shadow images
In the traditional secret image sharing, the secret image is encoded into two or more meaningless image shares, and single share cannot derive any information about the secret image. The meaningless image shares are insecure which may attract the notice of attackers during transmission process. More...
Đã lưu trong:
Tác giả chính: | |
---|---|
Tác giả khác: | |
Ngôn ngữ: | eng |
Được phát hành: |
Trường ĐH Phùng Giáp
2023
|
Truy cập trực tuyến: | https://opac.tvu.edu.vn/pages/opac/wpid-detailbib-id-43007.html |
Các nhãn: |
Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
|
Thư viện lưu trữ: | Trung tâm Học liệu – Phát triển Dạy và Học, Trường Đại học Trà Vinh |
---|
id |
https:--opac.tvu.edu.vn:9090-api-oai:43007 |
---|---|
record_format |
dspace |
spelling |
https:--opac.tvu.edu.vn:9090-api-oai:430072023-06-13T00:58:28Z Sharing secret messages using meaningful digital shadow images Võ Phước Hưng In the traditional secret image sharing, the secret image is encoded into two or more meaningless image shares, and single share cannot derive any information about the secret image. The meaningless image shares are insecure which may attract the notice of attackers during transmission process. Moreover, the meaningless share images are difficult to identify and manage in a large image database. Therefore, in 2007, Yang et al. proposed a user-friendly (k, n)-threshold scheme based on Shamir’s polynomial with different primes. Their method calculated differences between pixels in a block and their left pixels. According to the differences, the prime number for the Shamir’s polynomial can be decided and the differences were distributed to shares by using Shamir’s polynomial. This study proposes two novel user-friendly image sharing schemes. The first scheme uses polynomials with different primes to generate pixel shadows without adjusting the LSBs of original pixels, so that the recovery process can reconstruct a highquality original image using the Lagrange interpolation function. The second scheme develops an image-sharing system by using JPEG-LS prediction technique to classify prime numbers for encoding blocks. Owing to the involvement of JPEG-LS prediction technique, the produced differences not only refer to the left pixel but also their neighboring pixels. Therefore, the values of differences become small. This leads to high quality of the reconstructed image. Experimental results also confirm our statements. Trường ĐH Phùng Giáp Prof. Chin-Chen Chang (Người hướng dẫn Khoa học) 2023-06-13T00:58:28Z pdf https://opac.tvu.edu.vn/pages/opac/wpid-detailbib-id-43007.html eng |
institution |
Trung tâm Học liệu – Phát triển Dạy và Học, Trường Đại học Trà Vinh |
collection |
Thư viện số |
language |
eng |
description |
In the traditional secret image sharing, the secret image is encoded into two or more meaningless image shares, and single share cannot derive any information about the secret image. The meaningless image shares are insecure which may attract the notice of attackers during transmission process. Moreover, the meaningless share images are difficult to identify and manage in a large image database. Therefore, in 2007, Yang et al. proposed a user-friendly (k, n)-threshold scheme based on Shamir’s polynomial with different primes. Their method calculated differences between pixels in a block and their left pixels. According to the differences, the prime number for the Shamir’s polynomial can be decided and the differences were distributed to shares by using Shamir’s polynomial. This study proposes two novel user-friendly image sharing schemes. The first scheme uses polynomials with different primes to generate pixel shadows without adjusting the LSBs of original pixels, so that the recovery process can reconstruct a highquality original image using the Lagrange interpolation function. The second scheme develops an image-sharing system by using JPEG-LS prediction technique to classify prime numbers for encoding blocks. Owing to the involvement of JPEG-LS prediction technique, the produced differences not only refer to the left pixel but also their neighboring pixels. Therefore, the values of differences become small. This leads to high quality of the reconstructed image. Experimental results also confirm our statements. |
author2 |
Prof. Chin-Chen Chang (Người hướng dẫn Khoa học) |
author_facet |
Prof. Chin-Chen Chang (Người hướng dẫn Khoa học) Võ Phước Hưng |
author |
Võ Phước Hưng |
spellingShingle |
Võ Phước Hưng Sharing secret messages using meaningful digital shadow images |
author_sort |
Võ Phước Hưng |
title |
Sharing secret messages using meaningful digital shadow images |
title_short |
Sharing secret messages using meaningful digital shadow images |
title_full |
Sharing secret messages using meaningful digital shadow images |
title_fullStr |
Sharing secret messages using meaningful digital shadow images |
title_full_unstemmed |
Sharing secret messages using meaningful digital shadow images |
title_sort |
sharing secret messages using meaningful digital shadow images |
publisher |
Trường ĐH Phùng Giáp |
publishDate |
2023 |
url |
https://opac.tvu.edu.vn/pages/opac/wpid-detailbib-id-43007.html |
_version_ |
1812601056199180288 |