Year 2019,
Volume: 6 Issue: 3, 51 - 60, 30.09.2019
Vasif V. Nabiyev
,
Katira Soleymanzadeh
References
- [1] Blakley, G. R. "Safeguarding cryptographic keys", Proceedings of the national computer conference 48, 313–317 (1979).
- [2] Shamir, A. "How to share a secret", Commun. ACM, 22, 612–613 (1979).
- [3] Simmons, G. J., "How to (really) share a secret", Conference on the Theory and Application of Cryptography, 390–448 (Springer, 1988).
- [4] Tassa, T., "Hierarchical threshold secret sharing", J. Cryptol. 20, 237–264 (2007).
- [5] Naor, M. & Shamir, A., "Visual cryptography", Workshop on the Theory and Application of of Cryptographic Techniques, 1–12 (Springer, 1994).
- [6] Thien, C.-C. & Lin, J.-C., "Secret image sharing", Comput. Graph. 26, 765–770 (2002).
- [7] Wang, R.-Z. & Su, C.-H., "Secret image sharing with smaller shadow images", Pattern Recognit. Lett. 27, 551–555 (2006).
- [8] Tso, H.-K., "Sharing secret images using Blakley’s concept", Opt. Eng. 47, 77001 (2008).
- [9] Chen, C.-C., Fu, W.-Y. & Chen, C.-C. "A Geometry-Based Secret Image Sharing Approach", J. Inf. Sci. Eng., 24, 1567–1577 (2008).
- [10] Yang, C.-N., Wu, C.-C. & Chou, C.-W. A Comment on" Sharing Secret Images Using Blakley’s Concept", Intelligent Information Hiding and Multimedia Signal Processing, 2013 Ninth International Conference, 383–386 (IEEE, 2013).
- [11] Ulutas, M., Nabiyev, V. V & Ulutas, G., "Improvements in geometry-based secret image sharing approach with steganography", Math. Probl. Eng. 2009, (2009).
- [12] Guo, C., Chang, C.-C. & Qin, C. "A hierarchical threshold secret image sharing", Pattern Recognit. Lett. 33, 83–91 (2012).
- [13] Pakniat, N., Noroozi, M. & Eslami, Z. "Secret image sharing scheme with hierarchical threshold access structure", J. Vis. Commun. Image Represent. 25, 1093–1101 (2014).
- [14] Bhattacharjee, T., Maity, S. P. & Islam, S. R. "Hierarchical secret image sharing scheme in compressed sensing", Signal Process. Image Commun. 61, 21–32 (2018).
- [15] Li, P., Yang, C.-N. & Zhou, Z. "Essential secret image sharing scheme with the same size of shadows", Digit. Signal Process. 50, 51–60 (2016).
- [16] Liu, Y. & Yang, C. "Scalable secret image sharing scheme with essential shadows", Signal Process. Image Commun. 58, 49–55 (2017).
- [17] P, M. F. & P, A. J. R. "Hierarchical threshold secret sharing scheme for color images", Multimed. Tools Appl. 1–15 (2016). doi:10.1007/s11042-016-4074-y
Geometry Based Conjunctive Hierarchical Threshold Secret Image Sharing Scheme
Year 2019,
Volume: 6 Issue: 3, 51 - 60, 30.09.2019
Vasif V. Nabiyev
,
Katira Soleymanzadeh
Abstract
In hierarchical secret sharing scheme (HSSS), the secret is shared among participants with different privileges that are distributed into distinct levels. Although HSSS has been proposed by several researchers, none of them have been used geometry characteristics to define conjunctive hierarchical secret image sharing (HSIS) scheme. Moreover, small shadow images have important role in transmission over the network and also in storage demand. The main objective of this paper is to propose conjunctive HSIS scheme based on generalized Blakley’s projective geometry scheme with small size of shadow images.
References
- [1] Blakley, G. R. "Safeguarding cryptographic keys", Proceedings of the national computer conference 48, 313–317 (1979).
- [2] Shamir, A. "How to share a secret", Commun. ACM, 22, 612–613 (1979).
- [3] Simmons, G. J., "How to (really) share a secret", Conference on the Theory and Application of Cryptography, 390–448 (Springer, 1988).
- [4] Tassa, T., "Hierarchical threshold secret sharing", J. Cryptol. 20, 237–264 (2007).
- [5] Naor, M. & Shamir, A., "Visual cryptography", Workshop on the Theory and Application of of Cryptographic Techniques, 1–12 (Springer, 1994).
- [6] Thien, C.-C. & Lin, J.-C., "Secret image sharing", Comput. Graph. 26, 765–770 (2002).
- [7] Wang, R.-Z. & Su, C.-H., "Secret image sharing with smaller shadow images", Pattern Recognit. Lett. 27, 551–555 (2006).
- [8] Tso, H.-K., "Sharing secret images using Blakley’s concept", Opt. Eng. 47, 77001 (2008).
- [9] Chen, C.-C., Fu, W.-Y. & Chen, C.-C. "A Geometry-Based Secret Image Sharing Approach", J. Inf. Sci. Eng., 24, 1567–1577 (2008).
- [10] Yang, C.-N., Wu, C.-C. & Chou, C.-W. A Comment on" Sharing Secret Images Using Blakley’s Concept", Intelligent Information Hiding and Multimedia Signal Processing, 2013 Ninth International Conference, 383–386 (IEEE, 2013).
- [11] Ulutas, M., Nabiyev, V. V & Ulutas, G., "Improvements in geometry-based secret image sharing approach with steganography", Math. Probl. Eng. 2009, (2009).
- [12] Guo, C., Chang, C.-C. & Qin, C. "A hierarchical threshold secret image sharing", Pattern Recognit. Lett. 33, 83–91 (2012).
- [13] Pakniat, N., Noroozi, M. & Eslami, Z. "Secret image sharing scheme with hierarchical threshold access structure", J. Vis. Commun. Image Represent. 25, 1093–1101 (2014).
- [14] Bhattacharjee, T., Maity, S. P. & Islam, S. R. "Hierarchical secret image sharing scheme in compressed sensing", Signal Process. Image Commun. 61, 21–32 (2018).
- [15] Li, P., Yang, C.-N. & Zhou, Z. "Essential secret image sharing scheme with the same size of shadows", Digit. Signal Process. 50, 51–60 (2016).
- [16] Liu, Y. & Yang, C. "Scalable secret image sharing scheme with essential shadows", Signal Process. Image Commun. 58, 49–55 (2017).
- [17] P, M. F. & P, A. J. R. "Hierarchical threshold secret sharing scheme for color images", Multimed. Tools Appl. 1–15 (2016). doi:10.1007/s11042-016-4074-y