VDGMSISS: A Verifiable and Detectable Multi-Secret Images Sharing Scheme with General Access Structure

A secret image sharing scheme is a way to protect images. The main idea is dispersing the secret image into numerous shadow images. A secret image sharing scheme can withstand the impersonal attack and achieve the highly practical property of multiuse  is more practical. Therefore, this paper proposes a verifiable and detectable secret image-sharing scheme called VDGMSISS to solve the impersonal attack and to achieve some properties such as encrypting multi-secret images at one time and multi-use. Moreover, our scheme can also be used for any genera access structure.




References:
[1] G. R. Blakley, “Safeguarding Cryptographic Keys,” Proceeding of AFIPs
1979 National Computer Conference, Vol. 48, pp. 313-317, 1979.
[2] W. Diffie and M. Hellman “New Directions in Cryptography,” IEEE
Transactions on information Theory, Vol. 22, No. 6, pp. 644-654, 1976
[3] M. Garey and D. Johnson, Computers and Intractability: A Guide to the
Theory of NP-Completeness, W.H. Freeman and Company, 1979.
[4] L. Harn, “Efficient Sharing (Broadcasting) of Multiple Secrets,” IEEE
Proceedings-Computers and Digital Techniques, Vol. 142, No. 3, pp.
237-240, May, 1995.
[5] M. Ito, A. Saito and T. Nishizeki, “Secret Sharing Scheme
Realizing General Access Structure,” Proceedings of the IEEE Global
Telecommunications Conference, Globecom’87, pp. 99-102, 1987.
[6] M. Naor and A. Shamir, “Visual Cryptography,” Proceedings of Advances
in Cryptology: Eurocrypt’94, Lecture Notes in Computer Science, Vol.
950, pp. 1-12, 1995.
[7] R. L. Rivest, A. Shamir and L. Adleman “A Method for Obtaining Digital
Signatures and Public-key Cryptosystems,” Communications of the ACM,
Vol. 21, No. 2, pp. 120-126, 1978.
[8] A. Shamir, “How to Share a Secret,” Communications of the ACM, Vol.
22, No. 11, pp. 616-613, 1979.
[9] C. P. Schnorr, “Efficient Identification and Signatures for Smart Cards,”
Journal of Cryptology, Vol. 4, No. 3, pp. 239-252, 1991.
[10] C. C. Thien and J. C. Lin, “Secret Image Sharing,” Computers and
Graphics, Vol. 26, No. 5, pp. 765-770, 2002.
[11] R. Z. Wang and C. H. Su, “Secret Image Sharing with Smaller Shadow
Images,” Pattern Recognition Letters, Vol. 27, No. 6, pp. 551-555, 2006.
[12] R. Zhao, J. Zhao, F. Dai and F. Zhao, “A New Image Secret Sharing
Scheme to Identify Cheaters,” Computer Standards and Interfaces, Vol.
31, No. 1, pp. 252-257, 2009.