Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 418090, 7 pages
http://dx.doi.org/10.1155/2014/418090
Research Article

Nonlinear Secret Image Sharing Scheme

School of Computer Science and Engineering, Kyungpook National University, 80 Daehakro, Bukgu, Daegu 702-701, Republic of Korea

Received 14 February 2014; Revised 17 June 2014; Accepted 28 June 2014; Published 21 July 2014

Academic Editor: Long Cheng

Copyright © 2014 Sang-Ho Shin et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. D. R. Stinson, Cryptography Theory and Practice, Chapman & Hall/CRC Press, 3rd edition, 2006.
  2. W. Stallings, Cryptography and Network Security, Prentice Hall, 4th edition, 2006.
  3. A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1996.
  4. G. R. Blakley, “Safeguarding cryptographic keys,” in Proceedings of the International Workshop on Managing Requirements Knowledge, 1979.
  5. A. Shamir, “How to share a secret,” Communications of the Association for Computing Machinery, vol. 22, no. 11, pp. 612–613, 1979. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  6. I. Mitsuru, S. Akira, and N. Takao, “Secret sharing scheme realizing general access structure,” Electronics and Communications in Japan (Part III: Fundamental Electronic Science), vol. 72, no. 9, pp. 1520–6440, 1989. View at Google Scholar
  7. B. Schoenmakers, “A simple publicly verifiable secret sharing scheme and its application to electronic voting,” in Advances in Cryptology—CRYPTO’ 99, vol. 1666 of Lecture Notes in Computer Science, pp. 148–164, 1999. View at Google Scholar
  8. F. Paul, “A practical scheme for non-interactive verifiable secret sharing,” in Proceedings of the 28th Annual Symposium on Foundations of Computer Science, pp. 427–438, 1987.
  9. J. Benaloh and J. Leichter, “Generalized secret sharing and monotone functions,” in Advances in Cryptology—CRYPTO’ 88, vol. 403 of Lecture Notes in Computer Science, pp. 27–35, 1990. View at Google Scholar
  10. A. Beimel and B. Chor, “Secret sharing with public reconstruction,” IEEE Transactions on Information Theory, vol. 44, no. 5, pp. 1887–1896, 1998. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  11. M. Naor and A. Shamir, “Visual cryptography,” in Advances in Cryptology—EUROCRYPT'94, vol. 950 of Lecture Notes in Computer Science, pp. 1–12, Springer, Berlin, Germany, 1995. View at Publisher · View at Google Scholar · View at MathSciNet
  12. M. Naor and A. Shamir, “Visual cryptography II. Improving the contrast via the cover base,” in Security protocols, vol. 1189, pp. 197–202, Springer, Berlin, Germany, 1997. View at Publisher · View at Google Scholar · View at MathSciNet
  13. R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne, “A digital watermark,” in Proceedings of the IEEE International Conference Image Processing (ICIP '94), vol. 2, pp. 86–90, Austin, Tex, USA, November 1994. View at Publisher · View at Google Scholar
  14. W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding,” IBM Systems Journal, vol. 35, no. 3-4, pp. 313–335, 1996. View at Publisher · View at Google Scholar · View at Scopus
  15. C.-C. Thien and J.-C. Lin, “Secret image sharing,” Computers & Graphics, vol. 26, no. 5, pp. 765–770, 2002. View at Publisher · View at Google Scholar · View at Scopus
  16. C. Lin and W. Tsai, “Secret image sharing with steganography and authentication,” Journal of Systems and Software, vol. 73, no. 3, pp. 405–414, 2004. View at Publisher · View at Google Scholar · View at Scopus
  17. C. Thien and J. Lin, “An image sharing method with user-friendly shadow images,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 12, pp. 1161–1169, 2003. View at Publisher · View at Google Scholar · View at Scopus
  18. P. Lin and C. Chan, “Invertible secret image sharing with steganography,” Pattern Recognition Letters, vol. 31, no. 13, pp. 1887–1893, 2010. View at Publisher · View at Google Scholar · View at Scopus
  19. M. Tompa and H. Woll, “How to share a secret with cheaters,” Journal of Cryptology, vol. 1, no. 3, pp. 133–138, 1989. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  20. C.-C. Chang and R.-J. Hwang, “Efficient cheater identification method for threshold schemes,” IEE Proceedings of Computers & Digital Techcuques, vol. 144, no. 1, pp. 23–27, 1997. View at Google Scholar
  21. A. Renvall and C. Ding, “A nonlinear secret sharing scheme,” in Information Security and Privacy, vol. 1172 of Lecture Notes in Computer Science, pp. 56–66, Springer, Berlin, Germany, 1996. View at Google Scholar
  22. S. Katzenbeisser and F. A. P. Petitcolas, Information Hidhing Techniques for Steganography and Digital Watermarking, Artech House, London, UK, 2000.
  23. R.-Z. Wang and S.-J. Shyu, “Scalable secret image sharing,” Signal Processing: Image Communication, vol. 22, no. 4, pp. 363–373, 2007. View at Publisher · View at Google Scholar · View at Scopus
  24. C. Chang, Y. Hsieh, and C. Lin, “Sharing secrets in stego images with authentication,” Pattern Recognition, vol. 41, no. 10, pp. 3130–3137, 2008. View at Publisher · View at Google Scholar · View at Scopus