Constructions and Properties of k out of nVisual Secret Sharing Schemes
Designs, Codes and Cryptography
Lower bounds for robust secret sharing schemes
Information Processing Letters
Communications of the ACM
Generalized Secret Sharing and Monotone Functions
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
Sharing multiple secrets in digital images
Journal of Systems and Software
Secret image sharing with steganography and authentication
Journal of Systems and Software
User-friendly image sharing using polynomials with different primes
International Journal of Imaging Systems and Technology
A novel secret image sharing scheme in color images using small shadow images
Information Sciences: an International Journal
Sharing a verifiable secret image using two shadows
Pattern Recognition
A verifiable secret sharing scheme based on AMBTC
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication
Cheating immune (2, n)-threshold visual secret sharing
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
A method of estimating coding PSNR using quantized DCT coefficients
IEEE Transactions on Circuits and Systems for Video Technology
Hi-index | 0.00 |
We present a secret sharing scheme based on absolute moment block truncation coding (AMBTC) and Hamming code theory. AMBTC is composed of bit planes and two representative gray level pixel values, which are the high and low range means. In this secret sharing scheme, a dealer distributes a secret image to the participants as shadow images. It is important in a secret sharing scheme to keep the shadow images confidential. We therefore propose verifying the authenticity of the reconstructed secret image during the revealing and verifying phase. In order to improve confidentiality, our proposed scheme uses meaningful AMBTC compressed images. Experimental results show that the reconstructed secret sharing images are the same as the original secret sharing images and that the proposed scheme exhibits good performance compared to that of previous schemes.