سیویلیکا را در شبکه های اجتماعی دنبال نمایید.

A Novel Visual Secret Sharing Scheme Based on Cover Images and Boolean Operations

Publish Year: 1394
Type: Conference paper
Language: English
View: 629

This Paper With 8 Page And PDF Format Ready To Download

Export:

Link to this Paper:

Document National Code:

ITCC02_490

Index date: 11 September 2016

A Novel Visual Secret Sharing Scheme Based on Cover Images and Boolean Operations abstract

Visual secret sharing is a process of distributing the information into multiple encrypted shares, overlapping those shares according to access structure reveals the secret. Among existing image sharing schemes, Boolean-based secret schemes have good performance because they only require XOR calculation. In this paper, we propose a visual secret sharing scheme based on cover images and Boolean operations. The proposed scheme uses a random image generating function, which includes XOR and bit shift sub-functions to generate a random image from cover images. This random image generating function presents a secure scheme that shares a secret image and k cover images among n shared images and recovers the secret image using only these n shared images. Experimental results show that our proposed scheme provides secret sharing with proper security and acceptable computational complexity.

A Novel Visual Secret Sharing Scheme Based on Cover Images and Boolean Operations Keywords:

A Novel Visual Secret Sharing Scheme Based on Cover Images and Boolean Operations authors

Mohammad Ehsan Hemmati

Department of Information Technology, Kermanshah Science and Research Branch, Islamic Azad University, Kermanshah, Iran - Department of Information Technology, Kermanshah Branch, Islamic Azad University, Kermanshah, Iran

Neda Rezaei

Department of Information Technology, Kermanshah Science and Research Branch, Islamic Azad University, Kermanshah, Iran - Department of Information Technology, Kermanshah Branch, Islamic Azad University, Kermanshah, Iran

Mehrdad Ahmadzadeh Raji

Department of Mathematics, Razi University, Kermanshah, Iran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
«" Internationl Confcrencc & 3 National Confcrecncc on Ncw Tcchnologics ...
Naor M, Shamir A. Visual cryptography. In: Proc. of 13th ...
Shamir A. How to share a secret Comm. ACM 22(11), ...
Feng JB, Wu HC, Tsai CS, Chu YP. A new ...
Wang D, Zhang L, Ma N, Li X. Two secret ...
Chang CC, Lin CC, Le THN, Le HB. Sharing a ...
Lin TL, Horng SJ, Lee KH, Chiu PL, Kao TW, ...
Lin PY, Chan CS. Invertible secret image sharing with steganography. ...
Chen TH, Wu CS. Efficient mult secret image sharing based ...
Chen CC, Wu WJ. A secure Boolean-based multi-secret image sharing ...
Yadav GS, Ojha A. A novel multi secret sharing scheme ...
Guo T, Liu F, Wu C. k out of k ...
Chen TH, Li KC. Multi-image encryption by circular random grids. ...
Chen TH, Tsao KH, Lee YS. Yet another multiple-image encryption ...
Li P, Yang CN, Wu CC, Kong Q, Ma Y. ...
نمایش کامل مراجع