Research Article
BibTex RIS Cite
Year 2019, Volume: 6 Issue: 3, 51 - 60, 30.09.2019

Abstract

References

  • [1] Blakley, G. R. "Safeguarding cryptographic keys", Proceedings of the national computer conference 48, 313–317 (1979).
  • [2] Shamir, A. "How to share a secret", Commun. ACM, 22, 612–613 (1979).
  • [3] Simmons, G. J., "How to (really) share a secret", Conference on the Theory and Application of Cryptography, 390–448 (Springer, 1988).
  • [4] Tassa, T., "Hierarchical threshold secret sharing", J. Cryptol. 20, 237–264 (2007).
  • [5] Naor, M. & Shamir, A., "Visual cryptography", Workshop on the Theory and Application of of Cryptographic Techniques, 1–12 (Springer, 1994).
  • [6] Thien, C.-C. & Lin, J.-C., "Secret image sharing", Comput. Graph. 26, 765–770 (2002).
  • [7] Wang, R.-Z. & Su, C.-H., "Secret image sharing with smaller shadow images", Pattern Recognit. Lett. 27, 551–555 (2006).
  • [8] Tso, H.-K., "Sharing secret images using Blakley’s concept", Opt. Eng. 47, 77001 (2008).
  • [9] Chen, C.-C., Fu, W.-Y. & Chen, C.-C. "A Geometry-Based Secret Image Sharing Approach", J. Inf. Sci. Eng., 24, 1567–1577 (2008).
  • [10] Yang, C.-N., Wu, C.-C. & Chou, C.-W. A Comment on" Sharing Secret Images Using Blakley’s Concept", Intelligent Information Hiding and Multimedia Signal Processing, 2013 Ninth International Conference, 383–386 (IEEE, 2013).
  • [11] Ulutas, M., Nabiyev, V. V & Ulutas, G., "Improvements in geometry-based secret image sharing approach with steganography", Math. Probl. Eng. 2009, (2009).
  • [12] Guo, C., Chang, C.-C. & Qin, C. "A hierarchical threshold secret image sharing", Pattern Recognit. Lett. 33, 83–91 (2012).
  • [13] Pakniat, N., Noroozi, M. & Eslami, Z. "Secret image sharing scheme with hierarchical threshold access structure", J. Vis. Commun. Image Represent. 25, 1093–1101 (2014).
  • [14] Bhattacharjee, T., Maity, S. P. & Islam, S. R. "Hierarchical secret image sharing scheme in compressed sensing", Signal Process. Image Commun. 61, 21–32 (2018).
  • [15] Li, P., Yang, C.-N. & Zhou, Z. "Essential secret image sharing scheme with the same size of shadows", Digit. Signal Process. 50, 51–60 (2016).
  • [16] Liu, Y. & Yang, C. "Scalable secret image sharing scheme with essential shadows", Signal Process. Image Commun. 58, 49–55 (2017).
  • [17] P, M. F. & P, A. J. R. "Hierarchical threshold secret sharing scheme for color images", Multimed. Tools Appl. 1–15 (2016). doi:10.1007/s11042-016-4074-y

Geometry Based Conjunctive Hierarchical Threshold Secret Image Sharing Scheme

Year 2019, Volume: 6 Issue: 3, 51 - 60, 30.09.2019

Abstract

In hierarchical secret sharing scheme (HSSS), the secret is shared among participants with different privileges that are distributed into distinct levels. Although HSSS has been proposed by several researchers, none of them have been used geometry characteristics to define conjunctive hierarchical secret image sharing (HSIS) scheme. Moreover, small shadow images have important role in transmission over the network and also in storage demand. The main objective of this paper is to propose conjunctive HSIS scheme based on generalized Blakley’s projective geometry scheme with small size of shadow images. 

References

  • [1] Blakley, G. R. "Safeguarding cryptographic keys", Proceedings of the national computer conference 48, 313–317 (1979).
  • [2] Shamir, A. "How to share a secret", Commun. ACM, 22, 612–613 (1979).
  • [3] Simmons, G. J., "How to (really) share a secret", Conference on the Theory and Application of Cryptography, 390–448 (Springer, 1988).
  • [4] Tassa, T., "Hierarchical threshold secret sharing", J. Cryptol. 20, 237–264 (2007).
  • [5] Naor, M. & Shamir, A., "Visual cryptography", Workshop on the Theory and Application of of Cryptographic Techniques, 1–12 (Springer, 1994).
  • [6] Thien, C.-C. & Lin, J.-C., "Secret image sharing", Comput. Graph. 26, 765–770 (2002).
  • [7] Wang, R.-Z. & Su, C.-H., "Secret image sharing with smaller shadow images", Pattern Recognit. Lett. 27, 551–555 (2006).
  • [8] Tso, H.-K., "Sharing secret images using Blakley’s concept", Opt. Eng. 47, 77001 (2008).
  • [9] Chen, C.-C., Fu, W.-Y. & Chen, C.-C. "A Geometry-Based Secret Image Sharing Approach", J. Inf. Sci. Eng., 24, 1567–1577 (2008).
  • [10] Yang, C.-N., Wu, C.-C. & Chou, C.-W. A Comment on" Sharing Secret Images Using Blakley’s Concept", Intelligent Information Hiding and Multimedia Signal Processing, 2013 Ninth International Conference, 383–386 (IEEE, 2013).
  • [11] Ulutas, M., Nabiyev, V. V & Ulutas, G., "Improvements in geometry-based secret image sharing approach with steganography", Math. Probl. Eng. 2009, (2009).
  • [12] Guo, C., Chang, C.-C. & Qin, C. "A hierarchical threshold secret image sharing", Pattern Recognit. Lett. 33, 83–91 (2012).
  • [13] Pakniat, N., Noroozi, M. & Eslami, Z. "Secret image sharing scheme with hierarchical threshold access structure", J. Vis. Commun. Image Represent. 25, 1093–1101 (2014).
  • [14] Bhattacharjee, T., Maity, S. P. & Islam, S. R. "Hierarchical secret image sharing scheme in compressed sensing", Signal Process. Image Commun. 61, 21–32 (2018).
  • [15] Li, P., Yang, C.-N. & Zhou, Z. "Essential secret image sharing scheme with the same size of shadows", Digit. Signal Process. 50, 51–60 (2016).
  • [16] Liu, Y. & Yang, C. "Scalable secret image sharing scheme with essential shadows", Signal Process. Image Commun. 58, 49–55 (2017).
  • [17] P, M. F. & P, A. J. R. "Hierarchical threshold secret sharing scheme for color images", Multimed. Tools Appl. 1–15 (2016). doi:10.1007/s11042-016-4074-y
There are 17 citations in total.

Details

Primary Language English
Journal Section Computer Engineering
Authors

Vasif V. Nabiyev

Katira Soleymanzadeh

Publication Date September 30, 2019
Submission Date April 12, 2018
Published in Issue Year 2019 Volume: 6 Issue: 3

Cite

APA V. Nabiyev, V., & Soleymanzadeh, K. (2019). Geometry Based Conjunctive Hierarchical Threshold Secret Image Sharing Scheme. Gazi University Journal of Science Part A: Engineering and Innovation, 6(3), 51-60.