Browse > Article
http://dx.doi.org/10.3837/tiis.2014.05.016

Role-Balance Based Multi-Secret Images Sharing using Boolean Operations  

Chan, Chi-Shiang (Department of Applied Informatics and Multimedia, Asia University)
Chou, Yung-Chen (Department of Computer Science and Information Engineering, Asia University)
Chen, Yi-Hui (Department of Applied Informatics and Multimedia, Asia University)
Tsai, Yuan-Yu (Department of Applied Informatics and Multimedia, Asia University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.8, no.5, 2014 , pp. 1785-1800 More about this Journal
Abstract
In 2011, Chen and Wu proposed their method of sharing n secret images to n+1 shadow images through the concept of a Boolean-based Visual Secret Sharing (VSS) method. However, the shadow images produced by this method are not equally important. If the participant who owns an important shadow image does not want to cooperate with other participants, most secret images can not be reconstructed. In the proposed method, the relationship between the shadows images and secret images are designed in a circular way mostly. Each shadow image only relates to two secret images. This means that if one participant refuses to cooperate with other participants, there are only two secret images which can not be reconstructed. Moreover, our proposed method only needs to produce n shadow images and n secret images can be shared to them.
Keywords
Boolean-based VSS; Multi-secret image sharing; Visual secret sharing;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 C. C. Wu and L. H. Chen, "A Study on Visual Cryptography," Master Thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, 1998. H. C. Wu and C. C. Chang, "Sharing Visual Multi-secrets using Circle Shares," Computer Standards & Interfaces, vol. 134, no. 28, pp. 123-135, 2005.
2 C. H. Wang, and T. Hwang, "(t,m) Threshold and Generalized ID-based Conference Key Distribution System," Applied Mathematics and Computation, vol. 112, no. 2-3, pp. 181-191, 2000.   DOI   ScienceOn
3 G. Wei, X. Yang, and J. Shao, "Efficient Certificateless Authenticated Asymmetric Group Key Agreement Protocol," KSII Transactions on Internet and Information Systems, vol. 6, no. 12, pp. 3352-3365, 2012.
4 D. Wang, L. Zhang N. Ma, and X. Li, "Two Secret Sharing Schemes Based on Boolean Operations," Pattern Recognition, vol. 40, no. 10, pp. 2776-2785, 2007.   DOI   ScienceOn
5 W. J. Zhang, "Robust Multiparty Quantum Secret Key Sharing over Two Collective-noise Channels," Physical A: Statistical Mechanics and its Applications, vol. 361, no. 1, pp. 233-238, 2006.   DOI   ScienceOn
6 W. K. Chen, "Image Sharing Method for Gray-level Images," Journal of Systems and Software, vol. 86, no. 2, pp. 581-585, 2013.   DOI   ScienceOn
7 J. Chen, Y. S. Chen, H. C. Hsu, and H. W. Chen, "New Visual Cryptography System Based on Circular Shadow Image and Fixed Angle Segmentation," Journal of Electronic Imaging, vol. 14, no. 3, pp. 0330181 - 033018-5, 2005.
8 D. Catalano and R. Gennaro, "New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications," Journal of Computer and System Sciences, vol. 61, no. 1, pp. 51-80, 2000.   DOI   ScienceOn
9 T. H. Chen and C. S. Wu, "Efficient Multi-secret Image Sharing based on Boolean Operations," Signal Processing, vol. 91, pp. 90-97, 2011.   DOI   ScienceOn
10 D. W. Clark and L. J. Weng, "Maximal and Near-Maximal Shift Register Sequences: Efficient Event Counters and Easy Discrete Logarithms," IEEE Transactions on Computers, vol. 43, no. 5, pp. 560-568, 1994.   DOI   ScienceOn
11 C. C. Lin and W. H. Tsai, "Secret Image Sharing with Steganography and Authentication," Journal of Systems and Software, vol. 73, vol. 3, pp. 405-414, 2004.   DOI   ScienceOn
12 J. Nam, M. Kim, J. Paik, and D. Won, "Security weaknesses in Harn-Lin and Dutta-Barua Protocols for Group Key Establishment," KSII Transactions on Internet and Information Systems, vol. 6, no. 2, pp. 751-765, 2012.
13 M. Naor and A. Shamir, "Visual Cryptography," Lecture Notes in Computer Science, vol. 950, pp. 1-12, 1994.
14 A. Shamir, "How to Share a Secret," Communication of the ACM, vol. 22, no. 11, pp. 612-613, 1979.   DOI   ScienceOn
15 S. J. Shyu, S. Y. Huang, Y. K. Lee, and R. Z. Wang, "Sharing Multiple Secrets in Visual Cryptography," Pattern Recognition, vol. 40, no. 12, pp. 3633-3651, 2007.   DOI   ScienceOn
16 C. C. Thien, and J. C. Lin, "Secret Image Sharing," Computer & Graphics, vol. 26, pp. 765-770, 2002.   DOI   ScienceOn
17 C. Guo, C. C. Chang, N. Ma, and C. Qin, "A Multi-threshold Secret Image Sharing Scheme Based on MSP," Pattern Recognition Letters, vol. 33, pp. 1594-1600, 2012.   DOI   ScienceOn