An Image Secret Sharing Method
#1

An Image Secret Sharing Method


.pdf   An Image Secret Sharing Method.pdf (Size: 196.83 KB / Downloads: 7)

Abstract

This paper presents an image secret
sharing method which essentially incorporates two
k-out-of-n secret sharing schemes: i) Shamir's se-
cret sharing scheme and ii) matrix projection secret
sharing scheme.

Introduction

The e®ective and secure protections of sensitive infor-
mation [18] are primary concerns in commercial, med-
ical and military systems (e.g. communication systems
or network storage systems). Needless to say, it is also
important for an information fusion process to ensure
data is not being tampered. Encryption methods are
one of the popular approaches to ensure the integrity
and secrecy of the protected information. However,
one of the critical vulnerabilities of encryption tech-
niques is single-point-failure. For example, the secret
information cannot be recovered if the decryption key
is lost or the encrypted content is corrupted during the
transmission. To address these reliability problems, in
particular for large information content items such as
secret images (say satellite photos or medical images),
an image secret sharing scheme (SSS) is a good alter-
native to remedy such vulnerabilities.

Review of Secret Sharing
Schemes


We describe several (k, n) threshold-based SSSs and
describe how a secret and an image is shared among
n participants. These schemes are brie°y described in
this section with their interesting features.

Matrix Projection Secret Sharing
Scheme


Bai [2] developed a SSS using matrix projection. The
idea is based upon the invariance property of matrix
projection. This scheme can be used to share multiple
secrets, and detail of the scheme can be found in [2].
Here, we brie°y describe the procedure in two phases:

Proposed Method

Among several interesting properties of matrix projec-
tion SSS, an image application can be easily extended
from this scheme's ability to share multiple secrets.
The pixels in an image can be regarded as matrix el-
ements. Although the technique is not a PSS scheme,
it has strong protection of the secret [2] even if the re-
minder matrix R is made public. However, matrix R
can become single-point-failure if it is corrupted or lost.
To overcome this problem, we propose to use Thien and
Lin's method (which is essentially a Shamir's SSS) to
share the remainder matrix R without any permuta-
tion. As we discussed in section 2, Thien and Lin's
method cannot protect matrix R securely, but it does
not a®ect the protection capability on the projection
matrix.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: visitor alarm secret bell, www goverment sss mid, image secret sharing method, sss mid naumbat, sss m id, black secret societies tariq nasheed, sss mide nambra mp,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  A NOVEL METHOD OF COMPRESSING SPEECH WITH HIGHER BANDWIDTH EFFICIENCY seminar surveyer 5 2,309 02-04-2015, 04:28 PM
Last Post: seminar report asees
  A Digital Watermark Based on The Wavelet Transform and its Robustness on Image project topics 1 2,343 19-12-2012, 11:48 AM
Last Post: seminar details
  IMAGE AUTHENTICATION TECHNIQUES seminars report electronics seminars 6 8,553 15-11-2012, 12:24 PM
Last Post: seminar details
  Seminar Report on Image Authentication Techniques mechanical wiki 1 3,636 15-11-2012, 12:24 PM
Last Post: seminar details
  Histogram Specification: A Fast and Flexible Method to Process Digital Images computer girl 2 1,548 20-10-2012, 01:27 PM
Last Post: seminar details
  Digital image watermarking capacity and detection error rate computer science crazy 1 2,536 20-10-2012, 01:27 PM
Last Post: seminar details
  AN APPLICATION OF MORPHOLOGICAL IMAGE PROCESSING TO FORENSICS project topics 3 5,390 18-10-2012, 12:53 PM
Last Post: seminar details
  Image Steganography Technique Based on Wavelet Transform science projects buddy 2 3,062 06-10-2012, 01:25 PM
Last Post: seminar details
  Introduction of Digital Image Processing: computer girl 0 836 07-06-2012, 05:54 PM
Last Post: computer girl
  An Application of Image Processing For EYE WRITER computer girl 0 1,139 07-06-2012, 01:07 PM
Last Post: computer girl

Forum Jump: