scispace - formally typeset
Journal ArticleDOI

Selective scalable secret image sharing with verification

Jung-San Lee, +1 more
- 01 Jan 2017 - 
- Vol. 76, Iss: 1, pp 1-11
Reads0
Chats0
TLDR
The Salient map is introduced to develop a new method, in which the ROIs (region of interesting) of secret image can be revealed progressively, and to the best of the authors' knowledge, this is the first SSIS that employs a meaningful shadow.
Abstract
Scalable secret image sharing (SSIS) is a new secret image sharing technique. The feature of scalability refers to the fact that the revealed secret information is proportional to the number of gathered shadows. Once all of the valid shadows are collected, the complete secret can be revealed easily. The kernel of secret information, however, may be leaked out with a few shadows collected in the existing SSIS mechanisms. This is because researchers seldom concerned about secret distribution. Thus, we introduce the Salient map to develop a new method, in which the ROIs (region of interesting) of secret image can be revealed progressively. Additionally, we introduce the concepts of meaningful shadow and verification to SSIS. To the best of our knowledge, this is the first SSIS that employs a meaningful shadow. The leading adoption can greatly help reduce the attention of attackers in order to enhance the security, while the second concept can avoid malicious behaviors from outside attackers or dishonest members.

read more

Citations
More filters
Journal ArticleDOI

Strategies for data stream mining method applied in anomaly detection

TL;DR: The properties of data stream make analysis method different from the method based on data set and the analysis model is required to be updated immediately when concept drift occurs, and the difference between data stream and data set is compared.
Journal ArticleDOI

Ship recognition based on Hu invariant moments and convolutional neural network for video surveillance

TL;DR: Two fusion methods have been applied to verify the effectiveness of the proposed approach based on feature extraction at different levels and Experimental results show that the first fusion method achieves highest recognition accuracy in self-built dataset and visible and infrared spectrums (VAIS) dataset, up to 98.28% and 92.80% respectively.
Journal ArticleDOI

A parallel image encryption algorithm based on chaotic Duffing oscillators

TL;DR: A novel parallel image encryption algorithm, which is based on the chaotic duffing oscillators, is presented, which can be concluded that, the proposed scheme is efficient and secure.
Journal ArticleDOI

SVM-based global vision system of sports competition and action recognition

TL;DR: For complex human poses and partially occluded human targets, this paper proposes to express the entire human body through multiple parts to achieve rapid target discrimination when the environmental brightness changes, which improves the accuracy of recognition.
Journal ArticleDOI

CP-PSIS: CRT and polynomial-based progressive secret image sharing

TL;DR: Theoretical analyses and experimental results have demonstrated that the proposed schemes are general, flexible and extendable for different PSIS applications and are the first to utilize the homomorphism of CRT in the Lagrange interpolation operation.
References
More filters
Journal ArticleDOI

How to share a secret

TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Proceedings ArticleDOI

Salient Object Detection: A Discriminative Regional Feature Integration Approach

TL;DR: This paper regards saliency map computation as a regression problem, which is based on multi-level image segmentation, and uses the supervised learning approach to map the regional feature vector to a saliency score, and finally fuses the saliency scores across multiple levels, yielding the salency map.
Journal ArticleDOI

Secret image sharing

TL;DR: A method such that a secret image is shared by n shadow images, and any r shadow images of them can be used to restore the whole secret image, and the size of each shadow image is smaller than the secret image in this method.
Journal ArticleDOI

Secret image sharing with steganography and authentication

TL;DR: A novel approach to secret image sharing based on a (k, n)-threshold scheme with the additional capabilities of steganography and authentication with the capability of authenticating the fidelity of each processed camouflage image, called a stego-image is proposed.
Journal ArticleDOI

Improvements of image sharing with steganography and authentication

TL;DR: A scheme to improve authentication ability that prevents dishonest participants from cheating is presented and the arrangement of embedded bits is defined to improve the quality of stego-image.
Related Papers (5)