Abstract | ||
---|---|---|
The (t, n)-threshold has been extended to secret image sharing due to its practicability. In this article, we provide a novel version that employs the modulus operator to embed the secret share into a host image. The simulator shows that the modulus operator is useful for decreasing shadow image distortion. Using Rabin's signature cryptosystem, participants can detect if a cheater exists in the cooperation. In particular, the new mechanism permits involved members to restore a lossless secret image and to reconstruct a distortion-free host image. |
Year | DOI | Venue |
---|---|---|
2009 | 10.1016/j.patcog.2008.09.014 | Pattern Recognition |
Keywords | Field | DocType |
secret share,distortion-free host image,new mechanism,lossless secret image,distortion-free secret image sharing,shadow image distortion,secret image,host image,modulus operator,signature cryptosystem,novel version,secret sharing | Computer vision,Secret sharing,Image quality,Image processing,Image sharing,Cryptosystem,Verifiable secret sharing,Artificial intelligence,Shamir's Secret Sharing,Homomorphic secret sharing,Mathematics | Journal |
Volume | Issue | ISSN |
42 | 5 | Pattern Recognition |
Citations | PageRank | References |
38 | 1.35 | 11 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Pei-Yu Lin | 1 | 171 | 9.53 |
Jung-San Lee | 2 | 353 | 30.52 |
Chin Chen Chang | 3 | 7849 | 725.95 |