Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
454401 | Computer Standards & Interfaces | 2009 | 6 Pages |
Abstract
A verifiable image secret sharing scheme, which is based on the Thien-Lin scheme and the intractability of the discrete logarithm, is proposed in this paper. The new scheme can identify the cheaters no matter if she/he is the original secret image holder or the participant; because each participant chooses her/his own secret shadow by her/himself, the new system doesn't need a security channel; Due to the same fact, the secret shadow of each participant can be reused. In addition, the size of each shadow image, same as the Thien-Lin scheme, is smaller than that of the original secret image.
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Rong Zhao, Jian-jie Zhao, Fang Dai, Feng-qun Zhao,