Reference Hub7
Image Secret Sharing Construction for General Access Structure with Meaningful Share

Image Secret Sharing Construction for General Access Structure with Meaningful Share

Xuehu Yan, Yuliang Lu, Lintao Liu, Duohe Ma
Copyright: © 2018 |Volume: 10 |Issue: 3 |Pages: 12
ISSN: 1941-6210|EISSN: 1941-6229|EISBN13: 9781522543626|DOI: 10.4018/IJDCF.2018070106
Cite Article Cite Article

MLA

Yan, Xuehu, et al. "Image Secret Sharing Construction for General Access Structure with Meaningful Share." IJDCF vol.10, no.3 2018: pp.66-77. http://doi.org/10.4018/IJDCF.2018070106

APA

Yan, X., Lu, Y., Liu, L., & Ma, D. (2018). Image Secret Sharing Construction for General Access Structure with Meaningful Share. International Journal of Digital Crime and Forensics (IJDCF), 10(3), 66-77. http://doi.org/10.4018/IJDCF.2018070106

Chicago

Yan, Xuehu, et al. "Image Secret Sharing Construction for General Access Structure with Meaningful Share," International Journal of Digital Crime and Forensics (IJDCF) 10, no.3: 66-77. http://doi.org/10.4018/IJDCF.2018070106

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This article describes how the (k, n) threshold image secret sharing technology can recover the secret image even n − k shares are lost, or n−k servers do not work, which is useful for cloud storage, etc. Image secret sharing for general access structure (GAS) is more general than (k, n) threshold. Image secret sharing with a meaningful share will decrease encryption suspicion so that the security can be enhanced. However, traditional studies have no image secret sharing construction approach for GAS with a meaningful share. In the article, they first exploit an image secret sharing construction approach for GAS with meaningful share. Following their construction approach, the authors develop a random grid (RG)-based visual secret sharing (VSS) algorithm for GAS with meaningful share as well as polynomial-based image secret sharing for GAS with meaningful share. The experiments with this concept exhibit the effectiveness of the algorithms and further their construction approach.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.