General Meaningful Shadow Construction in Secret Image Sharing
Secret image sharing (SIS) is an important technique for image protection. Several shadows are produced in SIS through scrambling pixel values and their correlations of a secret image. We can own sufficient shadows to retrieve the secret image. Meaningful shadow will increase management efficiency a...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2018-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8435908/ |
id |
doaj-c0386466792c45fabd8a90496c0c4d71 |
---|---|
record_format |
Article |
spelling |
doaj-c0386466792c45fabd8a90496c0c4d712021-03-29T21:13:32ZengIEEEIEEE Access2169-35362018-01-016452464525510.1109/ACCESS.2018.28654218435908General Meaningful Shadow Construction in Secret Image SharingXuehu Yan0https://orcid.org/0000-0001-6388-1720Yuliang Lu1Lintao Liu2National University of Defense Technology, Hefei, ChinaNational University of Defense Technology, Hefei, ChinaNational University of Defense Technology, Hefei, ChinaSecret image sharing (SIS) is an important technique for image protection. Several shadows are produced in SIS through scrambling pixel values and their correlations of a secret image. We can own sufficient shadows to retrieve the secret image. Meaningful shadow will increase management efficiency as well as decrease encryption suspiciousness. More importantly, it may be applied to encrypted domain searching, which is useful in distributed storage and cloud computing. Hence, the meaningful shadow will save labor and reduce energy consumption. In this paper, based on analyses of the image, SIS, and meaningful shadow, we design a general SIS construction method with meaningful shadow and no pixel expansion, by which and some classic SIS techniques with meaningless (noise-like) shadow some SIS algorithms with meaningful shadow are derived. We take some experiments to demonstrate the effectiveness of our method.https://ieeexplore.ieee.org/document/8435908/Secret image sharingextended secret image sharingpolynomial-based secret image sharingvisual cryptographymeaningful shadow |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Xuehu Yan Yuliang Lu Lintao Liu |
spellingShingle |
Xuehu Yan Yuliang Lu Lintao Liu General Meaningful Shadow Construction in Secret Image Sharing IEEE Access Secret image sharing extended secret image sharing polynomial-based secret image sharing visual cryptography meaningful shadow |
author_facet |
Xuehu Yan Yuliang Lu Lintao Liu |
author_sort |
Xuehu Yan |
title |
General Meaningful Shadow Construction in Secret Image Sharing |
title_short |
General Meaningful Shadow Construction in Secret Image Sharing |
title_full |
General Meaningful Shadow Construction in Secret Image Sharing |
title_fullStr |
General Meaningful Shadow Construction in Secret Image Sharing |
title_full_unstemmed |
General Meaningful Shadow Construction in Secret Image Sharing |
title_sort |
general meaningful shadow construction in secret image sharing |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2018-01-01 |
description |
Secret image sharing (SIS) is an important technique for image protection. Several shadows are produced in SIS through scrambling pixel values and their correlations of a secret image. We can own sufficient shadows to retrieve the secret image. Meaningful shadow will increase management efficiency as well as decrease encryption suspiciousness. More importantly, it may be applied to encrypted domain searching, which is useful in distributed storage and cloud computing. Hence, the meaningful shadow will save labor and reduce energy consumption. In this paper, based on analyses of the image, SIS, and meaningful shadow, we design a general SIS construction method with meaningful shadow and no pixel expansion, by which and some classic SIS techniques with meaningless (noise-like) shadow some SIS algorithms with meaningful shadow are derived. We take some experiments to demonstrate the effectiveness of our method. |
topic |
Secret image sharing extended secret image sharing polynomial-based secret image sharing visual cryptography meaningful shadow |
url |
https://ieeexplore.ieee.org/document/8435908/ |
work_keys_str_mv |
AT xuehuyan generalmeaningfulshadowconstructioninsecretimagesharing AT yulianglu generalmeaningfulshadowconstructioninsecretimagesharing AT lintaoliu generalmeaningfulshadowconstructioninsecretimagesharing |
_version_ |
1724193341257547776 |