...
首页> 外文期刊>Multimedia Tools and Applications >(t, n) Threshold secret image sharing scheme with adversary structure
【24h】

(t, n) Threshold secret image sharing scheme with adversary structure

机译:(t,n)具有对手结构的阈值秘密图像共享方案

获取原文
获取原文并翻译 | 示例

摘要

Secret image sharing has been researched intensively, and it has emerged as an alternative to data hiding for protecting the security and privacy of important data. In the traditional (t, n) threshold secret image sharing schemes, any t or more shadow images can reconstruct the shared secret image. However, in real applications, (t, n) threshold access structures cannot meet all of the requirements, such as the adversary structure, which means that unauthorized groups of participants cannot reconstruct the shared secret. Thus, in (t, n) threshold secret sharing with adversary structure, t participants who want to reconstruct the secret cannot do so if they happen to belong to the defined adversary structure. This novel characteristic has the potential to work in many applications. However, the existing secret image sharing mechanisms cannot achieve the adversary structure. To solve this problem, we proposed a secret image sharing scheme that can achieve the adversary structure. In addition, our scheme also is a (t, n) threshold secret image sharing scheme. That is, t or more shadow images can be used to reconstruct the secret image, but some subsets that contain at least t shadow images among the adversary structures cannot reconstruct the secret image. The experimental results showed that the validity of our scheme is satisfactory.
机译:秘密图像共享已经得到了广泛的研究,它已经成为隐藏数据的替代方法,以保护重要数据的安全性和私密性。在传统的(t,n)门限秘密图像共享方案中,任何t个或更多阴影图像都可以重建共享的秘密图像。但是,在实际应用中,(t,n)门限访问结构不能满足所有要求,例如对手结构,这意味着未经授权的参与者组无法重建共享秘密。因此,在与对手结构共享(t,n)阈值秘密的情况下,如果想要重建秘密的t个参与者恰好属于已定义的对手结构,则他们无法这样做。这种新颖的特性具有在许多应用中工作的潜力。但是,现有的秘密图像共享机制无法实现对手结构。为了解决这个问题,我们提出了一种可以实现对手结构的秘密图像共享方案。另外,我们的方案也是(t,n)阈值秘密图像共享方案。即,可以使用t个或多个阴影图像来重建秘密图像,但是在敌对结构中至少包含t个阴影图像的某些子集不能重建秘密图像。实验结果表明,该方案的有效性是令人满意的。

著录项

  • 来源
    《Multimedia Tools and Applications 》 |2017年第20期| 21193-21210| 共18页
  • 作者单位

    Dalian Univ Technol, Sch Software Technol, Dalian 116620, Peoples R China|Key Lab Ubiquitous Network & Serv Software Liaoni, Dalian 116620, Peoples R China;

    Dalian Univ Technol, Sch Software Technol, Dalian 116620, Peoples R China|Key Lab Ubiquitous Network & Serv Software Liaoni, Dalian 116620, Peoples R China;

    Dalian Univ Technol, Sch Software Technol, Dalian 116620, Peoples R China|Key Lab Ubiquitous Network & Serv Software Liaoni, Dalian 116620, Peoples R China;

    Dalian Univ Technol, Sch Software Technol, Dalian 116620, Peoples R China|Key Lab Ubiquitous Network & Serv Software Liaoni, Dalian 116620, Peoples R China;

    Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing 210044, Jiangsu, Peoples R China;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Adversary structure; Secret image sharing; (t, n) threshold; Distortion free;

    机译:对手结构;秘密图像共享;(t;n)阈值;无失真;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号