A New k-out-of-n Scalable Secret Image Sharing Scheme

碩士 === 國立東華大學 === 資訊工程學系 === 97 === Due to fast growth of Internet application, more and more multimedia data are transmitted via Internet, especially digital images. Due to the insecurity of Internet, digital images can be easily retrieved, copied and tampered. Thus, how to protect digital images i...

Full description

Bibliographic Details
Main Authors: Sin-Ming Huang, 黃信銘
Other Authors: Ching-Nung Yang
Format: Others
Language:en_US
Published: 2009
Online Access:http://ndltd.ncl.edu.tw/handle/38575144759681924841
Description
Summary:碩士 === 國立東華大學 === 資訊工程學系 === 97 === Due to fast growth of Internet application, more and more multimedia data are transmitted via Internet, especially digital images. Due to the insecurity of Internet, digital images can be easily retrieved, copied and tampered. Thus, how to protect digital images is an important issue. The (k, n) secret image sharing scheme is a kind of digital image protection scheme, which distributes a secret image into n shadow images and the secret image can be reconstructed from any k (k≤n) shadow images. Recently, Wang et al introduced a new type of (2, n) scalable secret image sharing (SSIS) scheme, which can gradually reconstruct a secret image in a scalable manner in which the amount of secret information is proportional to the number of participants. In this paper, we propose two approaches for constructing the (k, n)-SSIS schemes. Approach 1 and Approach 2, respectively, have shadow with sizes 1/n times and 1/k times that of the secret image. A (2, n)-SSIS scheme using Approach 1 has lesser shadow size than Wang et al’s (2, n)-SSIS scheme, which is more suitable for faster transmission in a distributed multimedia system. On the other hand, Approach 2 is reduced to Wang et al’s (2, n)-SSIS scheme for k=2. Although the authors claim that their (2, n)-SSIS scheme can be easily extended to the general (k, n) scheme, the extension is not that easy as the authors claim. For the completeness of a (k, n)-SSIS scheme, both approaches are introduced.