WANG Xiang, PEI Qingqi, YAN Peimin, LI Hui, WANG Yong. A Novel Visual Multi-Secret Sharing Scheme Based on Folding-up Operation[J]. Chinese Journal of Electronics, 2013, 22(4): 795-798.
Citation: WANG Xiang, PEI Qingqi, YAN Peimin, LI Hui, WANG Yong. A Novel Visual Multi-Secret Sharing Scheme Based on Folding-up Operation[J]. Chinese Journal of Electronics, 2013, 22(4): 795-798.

A Novel Visual Multi-Secret Sharing Scheme Based on Folding-up Operation

Funds:  This work is supported by the National Natural Science Foundation of China (No.61202391, No.61172068, No.61172053 and No.U0835004), the Fundamental Research Funds for the Central Universities (No.K5051201030 and No.K50511010003), the 111 Project (No.B08038) and Program for New Century Excellent Talents in University (No.NCET-11-0691), the Postdoctoral Science Foundation of China (No.2012M521748).
More Information
  • Corresponding author: PEI Qingqi
  • Received Date: 2012-07-01
  • Rev Recd Date: 2012-12-01
  • Publish Date: 2013-09-25
  • The Visual multi-secret sharing (VMSS) scheme is characterized by encoding several secret images into a set of noise-like shares. Most existing VMSS methods have to distort shares to embed additional secret images. As a result, the quality of the decoded original secret image is degraded. This paper proposes a folding-up operation based VMSS scheme, which is able to encode one secret image and a group of tag images into shares. The secret image is revealed by stacking all shares, and folding up each chosen share discloses the tag image. The proposed scheme encodes tag images without affecting the quality of the reconstructed secret image. The quality of the decoded secret image is equal to that of the conventional Visual secret sharing (VSS) scheme. The superiority of the proposed method is experimental verified.
  • loading
  • M. Naor and A. Shamir, “Visual cryptography”, Advances in Cryptolgy EUROCRYPT, Vol.950, pp.1-12, 1995.
    Y.F. Chen, Y.K. Chan, C.C. Huang, M.H. Tsai, Y.P. Chu, “Am ultiple-level visual secret-shating scheme without image sizee xpansion”, Information Sciences, Vol.177, No.21, pp.4696-4710, 2007.
    Wen-Pinn and Fang, “Friendly progressive visual secret sharing”, Pattern Recognition, Vol.41, No.4, pp.1410-1414, 2008.
    Y. Zhonglan, X. Guangsheng and D. Ye, “Nested visual cryptographys cheme”, Chinese Journal of Electronics, Vol.17, No.3,p p.459-463, 2008.
    S.J. Shyu, “Image encryption by multiple tandom grids”, PatternR ecognition, Vol.42, No.7, pp.1582-1596, 2009.
    L. Chen and C. Wu, “A study on visual cryptography”, Ph.D.D issertation, Master Thesis, National Chiao Tung University,T aiwan, ROC, 1998.
    H.C. Wu and C.C. Chang, “Sharing visual multi-secrets usingc ircle shares”, Computer Standards & Interfaces, Vol.28, No.1,p p.123-135, 2005.
    J.B. Feng, H.C. Wu, C.S. Tsai, Y.F. Chang, Y.P. Chu, “Visuals ecret sharing for multiple secrets”, Pattern Recagnition,Vol.41, No.12, pp.3572-3581, 2008.
    J. Chen, T.S. Chen, H.C. Hsu, Y.H. Lin, “Using multi-ringeds hadow image of visual cryptography to hide more secret messages”,I maging Science Journal, Vol.57, No.2, pp.101-108,2 009.
    R.Z. Wang and S.F. Hsu, “Tagged Visual cryptography”, IEEES ignal Processing Letters, Vol.18, No.11, pp.627-630, 2011.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (234) PDF downloads(1081) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return