An Efficient Essential Secret Image Sharing Scheme Using Derivative Polynomial

As a popular technology in information security, secret image sharing is a method to guarantee the secret image’s security. Usually, the dealer would decompose the secret image into a series of shadows and then assign them to a number of participants, and only a quorum of participants could recover the secret image. Generally, it is assumed that every participant is equal. Actually, due to their position in many practical applications, some participants are given special privileges. Therefore, it is desirable to give an approach to generate shadows with different priorities shadows. In this paper, an efficient essential secret image sharing scheme using a derivative polynomial is proposed. Compared with existing related works, our proposed scheme can not only create the same-sized shadows with smaller size but also removes the concatenation operation in the sharing phase. Theoretical analysis and simulations confirm the security and effectiveness of the proposed scheme.

[1]  Wei Guo,et al.  A Practical Privacy-Preserving Data Aggregation (3PDA) Scheme for Smart Grid , 2019, IEEE Transactions on Industrial Informatics.

[2]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[3]  Daoshun Wang,et al.  An efficient XOR-based verifiable visual cryptographic scheme , 2018, Multimedia Tools and Applications.

[4]  Peng Li,et al.  A construction method of (t, k, n)-essential secret image sharing scheme , 2018, Signal Process. Image Commun..

[5]  Yining Liu,et al.  A novel multiple-level secret image sharing scheme , 2018, Multimedia Tools and Applications.

[6]  Ching-Nung Yang,et al.  Essential secret image sharing scheme with different importance of shadows , 2013, J. Vis. Commun. Image Represent..

[7]  Chaoyang Zhang,et al.  Collaborative Visual Cryptography Schemes , 2018, IEEE Transactions on Circuits and Systems for Video Technology.

[8]  Zhe Xia,et al.  Privacy-preserving raw data collection without a trusted authority for IoT , 2019, Comput. Networks.

[9]  Xiangyang Luo,et al.  A new threshold changeable secret sharing scheme based on the Chinese Remainder Theorem , 2019, Inf. Sci..

[10]  Peng Li,et al.  Reducing shadow size in essential secret image sharing by conjunctive hierarchical approach , 2015, Signal Process. Image Commun..

[11]  Mingchu Li,et al.  A novel weighted threshold secret image sharing scheme† , 2015, Secur. Commun. Networks.

[12]  Peng Li,et al.  Essential secret image sharing scheme with the same size of shadows , 2016, Digit. Signal Process..

[13]  Tamir Tassa Hierarchical Threshold Secret Sharing , 2004, TCC.

[14]  Shyong Jian Shyu,et al.  Weighted Threshold Secret Image Sharing , 2009, PSIVT.

[15]  Shang-Kuan Chen,et al.  Essential secret image sharing with increasable shadows , 2016 .

[16]  Chin-Chen Chang,et al.  A novel image protection scheme using bit-plane compression and secret sharing , 2017 .

[17]  Kuang-Shyr Wu A secret image sharing scheme for light images , 2013, EURASIP J. Adv. Signal Process..

[18]  Chin-Chen Chang,et al.  A hierarchical threshold secret image sharing , 2012, Pattern Recognit. Lett..

[19]  Ali Kanso,et al.  An efficient (t,n)–threshold secret image sharing scheme , 2017, Multimedia Tools and Applications.

[20]  Zhen Wu,et al.  An improved threshold multi-level image recovery scheme , 2018, J. Inf. Secur. Appl..

[21]  Ja-Chen Lin,et al.  Secret image sharing , 2002, Comput. Graph..

[22]  Chien-Chang Chen,et al.  An Expandable Essential Secret Image Sharing Structure , 2016, J. Inf. Hiding Multim. Signal Process..

[23]  Chien-Chang Chen,et al.  Weighted modulated secret image sharing method , 2009, J. Electronic Imaging.

[24]  Ja-Chen Lin,et al.  Fast-weighted secret image sharing , 2009 .

[25]  Chien-Chang Chen,et al.  Essential secret image sharing scheme with equal-sized shadows generation , 2018, J. Vis. Commun. Image Represent..

[26]  Chien-Chang Chen,et al.  Two-layered structure for optimally essential secret image sharing scheme , 2016, J. Vis. Commun. Image Represent..

[27]  Ziba Eslami,et al.  Secret image sharing scheme with hierarchical threshold access structure , 2014, J. Vis. Commun. Image Represent..