Abstract
In order to solve the problem of security during transmission of the large secret true color image, It is proposed that the secret image sharing method based on the Lagrange’s interpolating polynomial, the n shadow images of the secret image were made by compressiong, substitute, encoding and disassemble to the secret image, each shadow image is hidden in an ordinary image so as not to attract an attacker’s attention, the size of each stego image (in which a shadow image is hidden) is about 1/t of the secret image. Any t images in the n stego images can be used to recover the original secret image. The sharing principle and the recovery fomula are brought, the speed of the image sharing and recovery is heightened in this way, and the process of calculation is simplified. The method is discussed in different Galois domain, drawn the conditions that image block should satisfy, the best way to control the ratio of data expansion effectively and the relationships between security and anti-destructive. If the image as a mass of data, the method can be applied to the secure transmission and storage of huge amounts of data in the cloud computing.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Naor, M., Shamir, A.: Visual Cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)
Blundo, C., De Santis, A., Naor, M.: Visual cryptography for grey level images. Information Processing Letters 75(6), 255–259 (2000)
Hou, Y.C.: Visual cryptography for color images. Pattern Recognition 36(7), 1619–1629 (2003)
Chang, C.C., Lin, I.C.: A New (t,n) Threshold Image Hiding Scheme for Sharing a Secret Color Image. In: Proceedings of the International Conference on Communication Technology, Beijing, vol. 1, pp. 196–202 (2003)
Chang, C.C., Chuang, J.C.: An image intellectual property protection scheme for gray level images using visual secret sharing strategy. Pattern Recognition Letters 23(8), 931–941 (2002)
Yang, C.C., Chang, T.Y., Hwang, M.S.: A (t,n) multi-secret sharing scheme. Applied Mathematics and Computations 151(2), 483–490 (2004)
Lukac, R., Plataniotis, K.N.: Color image secret sharing. Electronics Letters 40(9), 529–531 (2004)
Lvchao, Yu, M., Liu, Y.: The secret image sharing scheme based on Lagrange interpolation polynomial. Journal of Huazhong University of Science and Technology 33(12), 285–289 (2005)
del Rey, A.M.: A Matrix-Based Secret Sharing Scheme for Images. In: Ruiz-Shulcloper, J., Kropatsch, W.G. (eds.) CIARP 2008. LNCS, vol. 5197, pp. 635–642. Springer, Heidelberg (2008)
Elsheh, E., Ben Hamza, A.: Comments on Matrix-Based Secret Sharing Scheme for Images. In: Bloch, I., Cesar Jr., R.M. (eds.) CIARP 2010. LNCS, vol. 6419, pp. 169–175. Springer, Heidelberg (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chen, G., Liu, J., Wang, L. (2012). Color Image Sharing Method Based on Lagrange’s Interpolating Polynomial. In: He, J., Liu, X., Krupinski, E.A., Xu, G. (eds) Health Information Science. HIS 2012. Lecture Notes in Computer Science, vol 7231. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29361-0_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-29361-0_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-29360-3
Online ISBN: 978-3-642-29361-0
eBook Packages: Computer ScienceComputer Science (R0)