| Article ID | Journal | Published Year | Pages | File Type |
|---|---|---|---|---|
| 532729 | Pattern Recognition | 2009 | 10 Pages |
Abstract
The (t, n)-threshold has been extended to secret image sharing due to its practicability. In this article, we provide a novel version that employs the modulus operator to embed the secret share into a host image. The simulator shows that the modulus operator is useful for decreasing shadow image distortion. Using Rabin's signature cryptosystem, participants can detect if a cheater exists in the cooperation. In particular, the new mechanism permits involved members to restore a lossless secret image and to reconstruct a distortion-free host image.
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Vision and Pattern Recognition
Authors
Pei-Yu Lin, Jung-San Lee, Chin-Chen Chang,
