A Reliable (K, N) Image Secret Sharing Scheme with Low Information Overhead

Abstract This paper presents an image secret sharing scheme with low information overhead. The method essentially incorporates two different k-out-of-n secret sharing schemes: (i) Shamir’s secret sharing scheme, and (ii) matrix projection secret sharing scheme. The technique allows a secret image to be divided into n image shares so that: (i) any k image shares (k<n) can be used to reconstruct the secret image in a lossless manner, and (ii) any (k−1) or fewer image shares cannot reveal the secret image. The size of the image shares is smaller than the size of the secret image so that there is no much overhead to store or transmit the image shares. Because image shares are computed by partitioning the secret image into smaller blocks, it can also be processed in near-realtime with resilience to the noise corruptions

[1]  Ehud D. Karnin,et al.  On secret sharing systems , 1983, IEEE Trans. Inf. Theory.

[2]  Stelvio Cimato,et al.  Visual cryptography schemes with optimal pixel expansion , 2006, Theor. Comput. Sci..

[3]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[4]  K. Srinathan,et al.  Non-perfect Secret Sharing over General Access Structures , 2002, INDOCRYPT.

[5]  Alfredo De Santis,et al.  On the size of shares for secret sharing schemes , 1991, Journal of Cryptology.

[6]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[7]  Rastislav Lukac,et al.  A cost-effective encryption scheme for color images , 2005, Real Time Imaging.

[8]  Rastislav Lukac,et al.  Secure single-sensor digital camera , 2006 .

[9]  Ja-Chen Lin,et al.  Secret image sharing , 2002, Comput. Graph..

[10]  Li Bai,et al.  A strong ramp secret sharing scheme using matrix projection , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[11]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[12]  Alfredo De Santis,et al.  Multiple ramp schemes , 1999, IEEE Trans. Inf. Theory.

[13]  Rastislav Lukac,et al.  Digital image indexing using secret sharing schemes: a unified framework for single-sensor consumer electronics , 2005, IEEE Transactions on Consumer Electronics.

[14]  Kaoru Kurosawa,et al.  Nonperfect Secret Sharing Schemes and Matroids , 1994, EUROCRYPT.

[15]  Amos Beimel,et al.  Secret Sharing with Public Reconstruction , 1998, IEEE Trans. Inf. Theory.

[16]  Rastislav Lukac,et al.  Bit-level based secret sharing for image encryption , 2005, Pattern Recognition.

[17]  Stelvio Cimato,et al.  Probabilistic Visual Cryptography Schemes , 2006, Comput. J..