Cryptology ePrint Archive: Report 2013/524

Threshold Secret Image Sharing

Teng Guo, Feng Liu, ChuanKun Wu, ChingNung Yang, Wen Wang and YaWei Ren

Abstract: A (k; n) threshold secret image sharing scheme, abbreviated as (k; n)-TSISS, splits a secret image into n shadow images in such a way that any k shadow images can be used to reconstruct the secret image exactly. In 2002, for (k; n)-TSISS, Thien and Lin reduced the size of each shadow image to 1/k of the original secret image. Their main technique is by adopting all coefficients of a (k-1)-degree polynomial to embed the secret pixels. This bene t of small shadow size has drawn many researcher's attention and their technique has been extensively used in the following studies. In this paper, we rst show that this technique is neither information theoretic secure nor computational secure. Furthermore, we point out the security defect of previous (k; n)-TSISSs for sharing textual images, and then fi x up this security defect by adding an AES encryption process. At last, we prove that this new (k; n)-TSISS is computational secure.

Category / Keywords: applications / Secret image sharing, Security defect, Computational secure

Original Publication (with minor differences): ICICS 2013

Date: received 22 Aug 2013

Contact author: guoteng at iie ac cn

Available format(s): PDF | BibTeX Citation

Version: 20130830:084330 (All versions of this report)

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]