A Novel Threshold Changeable Secret Image Sharing Scheme
In secret image sharing, the image is divided into several stego images, which are managed by corresponding participants. The secret image can be recovered only when the number of authorized participants is no less than the threshold. Thus, it is widely used to protect essential images, such as engi...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2021-02-01
|
Series: | Symmetry |
Subjects: | |
Online Access: | https://www.mdpi.com/2073-8994/13/2/286 |
id |
doaj-3fcb3ab2cb1b4f779d6eecd796e4800d |
---|---|
record_format |
Article |
spelling |
doaj-3fcb3ab2cb1b4f779d6eecd796e4800d2021-02-08T00:02:58ZengMDPI AGSymmetry2073-89942021-02-011328628610.3390/sym13020286A Novel Threshold Changeable Secret Image Sharing SchemeGuohua Wu0Mingyao Wang1Qiuhua Wang2Ye Yao3Lifeng Yuan4Gongxun Miao5School of Cyberspace, Hangzhou Dianzi University, Hangzhou 310018, ChinaSchool of Cyberspace, Hangzhou Dianzi University, Hangzhou 310018, ChinaSchool of Cyberspace, Hangzhou Dianzi University, Hangzhou 310018, ChinaSchool of Cyberspace, Hangzhou Dianzi University, Hangzhou 310018, ChinaSchool of Cyberspace, Hangzhou Dianzi University, Hangzhou 310018, ChinaZhongfu Information Co., Ltd., Jinan 250101, ChinaIn secret image sharing, the image is divided into several stego images, which are managed by corresponding participants. The secret image can be recovered only when the number of authorized participants is no less than the threshold. Thus, it is widely used to protect essential images, such as engineering drawings and product design drawings. In the traditional secret image sharing scheme, the threshold is fixed and unique. However, in practice, the security policy and the adversarial structure may change; therefore, the threshold must be adjusted dynamically. In this paper, we propose a novel secret image sharing scheme with a changeable threshold capability. Our scheme eliminates the limit of the changeable threshold and reduces the computation required. Also, our scheme is the first threshold changeable secret image sharing scheme that can recover an undistorted cover image. The theoretical analysis shows that our scheme is safe even if the threshold is changed. The experiments demonstrated that the stego image generated by our algorithm has better quality than other changeable-threshold, secret image sharing algorithms.https://www.mdpi.com/2073-8994/13/2/286symmetrysecret image sharing schemeinterpolation polynomialthreshold changeable |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Guohua Wu Mingyao Wang Qiuhua Wang Ye Yao Lifeng Yuan Gongxun Miao |
spellingShingle |
Guohua Wu Mingyao Wang Qiuhua Wang Ye Yao Lifeng Yuan Gongxun Miao A Novel Threshold Changeable Secret Image Sharing Scheme Symmetry symmetry secret image sharing scheme interpolation polynomial threshold changeable |
author_facet |
Guohua Wu Mingyao Wang Qiuhua Wang Ye Yao Lifeng Yuan Gongxun Miao |
author_sort |
Guohua Wu |
title |
A Novel Threshold Changeable Secret Image Sharing Scheme |
title_short |
A Novel Threshold Changeable Secret Image Sharing Scheme |
title_full |
A Novel Threshold Changeable Secret Image Sharing Scheme |
title_fullStr |
A Novel Threshold Changeable Secret Image Sharing Scheme |
title_full_unstemmed |
A Novel Threshold Changeable Secret Image Sharing Scheme |
title_sort |
novel threshold changeable secret image sharing scheme |
publisher |
MDPI AG |
series |
Symmetry |
issn |
2073-8994 |
publishDate |
2021-02-01 |
description |
In secret image sharing, the image is divided into several stego images, which are managed by corresponding participants. The secret image can be recovered only when the number of authorized participants is no less than the threshold. Thus, it is widely used to protect essential images, such as engineering drawings and product design drawings. In the traditional secret image sharing scheme, the threshold is fixed and unique. However, in practice, the security policy and the adversarial structure may change; therefore, the threshold must be adjusted dynamically. In this paper, we propose a novel secret image sharing scheme with a changeable threshold capability. Our scheme eliminates the limit of the changeable threshold and reduces the computation required. Also, our scheme is the first threshold changeable secret image sharing scheme that can recover an undistorted cover image. The theoretical analysis shows that our scheme is safe even if the threshold is changed. The experiments demonstrated that the stego image generated by our algorithm has better quality than other changeable-threshold, secret image sharing algorithms. |
topic |
symmetry secret image sharing scheme interpolation polynomial threshold changeable |
url |
https://www.mdpi.com/2073-8994/13/2/286 |
work_keys_str_mv |
AT guohuawu anovelthresholdchangeablesecretimagesharingscheme AT mingyaowang anovelthresholdchangeablesecretimagesharingscheme AT qiuhuawang anovelthresholdchangeablesecretimagesharingscheme AT yeyao anovelthresholdchangeablesecretimagesharingscheme AT lifengyuan anovelthresholdchangeablesecretimagesharingscheme AT gongxunmiao anovelthresholdchangeablesecretimagesharingscheme AT guohuawu novelthresholdchangeablesecretimagesharingscheme AT mingyaowang novelthresholdchangeablesecretimagesharingscheme AT qiuhuawang novelthresholdchangeablesecretimagesharingscheme AT yeyao novelthresholdchangeablesecretimagesharingscheme AT lifengyuan novelthresholdchangeablesecretimagesharingscheme AT gongxunmiao novelthresholdchangeablesecretimagesharingscheme |
_version_ |
1724280387873538048 |