DOI QR코드

DOI QR Code

Role-Balance Based Multi-Secret Images Sharing using Boolean Operations

  • Chan, Chi-Shiang (Department of Applied Informatics and Multimedia, Asia University) ;
  • Chou, Yung-Chen (Department of Computer Science and Information Engineering, Asia University) ;
  • Chen, Yi-Hui (Department of Applied Informatics and Multimedia, Asia University) ;
  • Tsai, Yuan-Yu (Department of Applied Informatics and Multimedia, Asia University)
  • Received : 2013.12.08
  • Accepted : 2014.04.24
  • Published : 2014.05.29

Abstract

In 2011, Chen and Wu proposed their method of sharing n secret images to n+1 shadow images through the concept of a Boolean-based Visual Secret Sharing (VSS) method. However, the shadow images produced by this method are not equally important. If the participant who owns an important shadow image does not want to cooperate with other participants, most secret images can not be reconstructed. In the proposed method, the relationship between the shadows images and secret images are designed in a circular way mostly. Each shadow image only relates to two secret images. This means that if one participant refuses to cooperate with other participants, there are only two secret images which can not be reconstructed. Moreover, our proposed method only needs to produce n shadow images and n secret images can be shared to them.

Keywords

1. Introduction

Digital secret data are transferred across the Internet every day, and it is important to protect this secret data from being accessed by unauthorized users. The simplest way to achieve this goal is to encrypt the secret data with a secret key. However, if the secret key is lost or stolen from a careless key holder, an unauthorized user who obtains the secret key can freely access the secret data. In order to prevent this situation Shamir [10] proposed the (t, n) threshold scheme that divides a secret key into n key shadows. Each participant owns a key shadow and any t of n authorized participants can reconstruct the secret key through their key shadows.

Following this development many applications have been proposed using the (t, n) threshold scheme [3, 7, 8, 9, 12, 15, 16, 18]. In 1995 Naor and Shamir [9] applied a (t, n) threshold scheme to design a secret image sharing technique known as Visual Secret Sharing (VSS). Through VSS a secret image is shared to n shadow images and the shadow images are delivered to authorized participants. Those shadow images appear to be random images. When t shadow images are stacked, the secret image is revealed to visual perception without computation.

Several multiple-secret sharing schemes have been proposed [2, 11, 13, 14] to achieve the goal of sharing more secret images via the VSS technique. For example, Wu and Chen’s method [13] shared two secret images to two shadow images. The first secret image can be revealed by stacking two shadow images. The second secret image can be revealed by stacking two shadow images where one of the two shadow images needs to be rotated 90° counter-clockwise. The following researches [2, 11, 14] has extended Wu and Chen’s idea to multi-secret image sharing.

However, the VSS technique is applied to binary images and the reconstructed secret image comes from stacking two shadow images manually. This causes three problems when using the concept of the VSS technique to develop the schemes. The first problem is one of alignments. Two shadow images have to be aligned in exactly the right position otherwise the secret image can not be revealed; this is more appropriately achieved by computers rather than manually. The second problem is pixel expansion. To perform the VSS technique the pixels need to be expanded. Therefore, the size of the shadow image becomes larger than that of the secret image. The third problem is contrast. Because of the stacking property, the constructed secret image usually has low contrast. This means the image quality of the constructed secret image is very low.

Since there are problems in the traditional VSS technique, some improvement methods [1, 4, 6, 17] derived from the traditional VSS technique are developed. On of them is Boolean-based VSS [4, 17]. In fact, the stacking operator in the traditional VSS technique can be treated as an AND operator. On the other hand, the stacking operator in Boolean-based VSS is usually replaced with an Exclusive-OR (XOR) operator. Owing to the usage of an XOR operator, the secret images can be in the form of binary, gray-level, or color images. Similarly, the produced shadow images can also be in the form of binary, gray-level, or color images without expanding pixels.

For example, Wang et al. [17] proposed a Boolean-based VSS method by sharing a secret image to n shadow images. More precisely, Wang et al.’s method first generates n-1 random matrices, and the n shadow images are subsequently produced by performing an XOR operator on n-1 random matrices and the secret image. In order to share more secret images, Chen and Wu [4] developed their method by modifying Wang et al.’s method. To begin with, a random matrix is produced as the first shadow image. Then, n secret images are subsequently encoded into the other n shadow images. Finally, Chen and Wu’s method shared n secret images to n+1 shadow images.

There are some drawbacks in Chen and Wu’s method. The most important one is that not all shadow images are equally important. This means that if the participant with the important shadow image does not want to cooperate with other participants, all secret images can not be reconstructed. Although Guo et al.’s method [6] can achieve equally important shadow images totally, the computation complexity becomes larger in both sides of producing and stacking shares. Moreover, the size of the shares becomes larger than the original secret image.

In this paper the proposed method only needs to produce n shadow images and n secret images can be shared to them. Moreover, the relationship between the shadow image and secret image are modified in a circular way. Each shadow image only relates to two secret images. This means once one participant refuses to cooperate with other participants, only two secret images can not be reconstructed.

The rest of this paper is organized as follows: Chen and Wu’s method is introduced in Section 2. In Section 3 we give detailed descriptions of the proposed method. Section 4 presents the experimental results. Finally, conclusions are drawn in Section 5.

 

2. Related Work

In this section, Chen and Wu’s method [4] is reviewed. First of all, Chen and Wu assumed that all secret images were high entropy images, such as natural images photographed by a digital camera. Chen and Wu’s sharing and the reconstructing phases are described under this assumption in Subsection 2.1. However, in the case of secret images with low entropy Chen and Wu proposed a modified version of their method; as described in Subsection 2.2.

2.1 Chen and Wu’s Method

To begin with we define some variables for further use. Assume the variable n represents the number of secret images that we want to encode. The i-th secret image is denoted as Gi, where i is in the range from 0 to n-1. After performing the sharing phase, the i-th shadow image is represented as Si, where i is in the range from 0 to n. Note that Chen and Wu’s method shared n secret images to n+1 shadow images.

There are three steps in the sharing phase. The flow chart of Chen and Wu’s method is shown in Fig. 1. In the first step, the sharing phase generates a random integer matrix as the first shadow image S0. The size of the random integer matrix is the same as that of the secret image. The value of each element in the random integer matrix is in the range from 0 to 255. In the second step, the i-th temporary matrix Bi is produced according to Formula (1), where i is in the range from 1 to n-1.

where ⊕ stands for the XOR operator.

Fig. 1.The flow chart of Chen and Wu’s method

In the third step, the other shadow images are produced according to Formula (2):

Note that the first shadow image S0 is a random integer matrix while the other shadow images are produced according to Formula (2). Finally, n+1 shadow images can be obtained in the sharing phase. From Step 3 in Fig. 1, the shadow image Si (2 ≦ i ≦ n-1) is equal to Gi⊕Gi-1. The reason is that the shadow image Si comes from performing the XOR operator on Bi and Bi-1 according to Formula (2). Since Bi and Bi-1 come from Gi⊕S0 and Gi-1⊕S0, the shadow image Si is equal to Bi⊕Bi-1= (Gi⊕S0)⊕(Gi-1⊕S0)= Gi⊕Gi-1.

In the reconstruction phase, the i-th secret image can be obtained from shadow images according to Formula (3):

where Ψik=1Sk is S1⊕S2⊕…⊕Si.

2.2 The Modified Version of Chen and Wu’s Method

According to the descriptions in Subsection 2.1, the shadow image Si is equal to Gi⊕Gi-1 as shown in Fig. 1. It can be seen that the random matrix S0 has been eliminated. Therefore, if two secret images, Gi and Gi-1, are not high entropy images, a partial secret image may be revealed.

To overcome this problem, Chen and Wu’s method modified the method of producing the shadow image Si as follows:

The flow chart of the modified version of Chen and Wu’s method is shown in Fig. 2. The shadow image Si (2 ≦ i ≦ n-1) of the modified version of Chen and Wu’s method can be seen as performing the XOR operator on the random integer matrix S0 and the shadow image Si which comes from Step 3 in Fig. 1. Note that because S0 is a random matrix, the shadow image Si also becomes a random matrix after performing the XOR operator on Si and S0.

Fig. 2.The flow chart of the modified version of Chen and Wu’s method

Since the method of producing shadow image Si has been modified, the reconstructing formula, Formula (3), should also be modified simultaneously as follow:

Briefly, if the value of i is odd (odd number state), the secret image Gi is reconstructed from S0⊕S1⊕…⊕Si. On the other hand, if the value of i is even (even number state), the secret image Gi is reconstructed from S1⊕S2⊕…⊕Si.

 

3. The Proposed Method

In this section, we first introduce the drawbacks of Chen and Wu’s Method in Subsection 3.1. Then, the sharing and reconstruction phases of the proposed method are described in Subsection 3.2.

3.1 The Drawback of Chen and Wu’s Method

The first drawback of Chen and Wu’s method is that not all shadow images are equally important. From Formula (3) it can be seen that the role of the shadow image Si is more important than the other shadow image Sj, where j is larger than i. The relationship between secret images and shadow images is shown in Fig. 3. In Fig. 3, G1 can be reconstructed through S0 and S1, and G2 can be reconstructed through S0, S1 and S2, and so on. From this it can be seen that if the shadow image Si is not handed over, the secret image Gj (j ≥ i) can not be reconstructed. For example, if the participant who owns the shadow image S1 does not want to cooperate with other participants, none of the secret images can be reconstructed. Of course this kind of mechanism may be useful in some conditions. However, in the secret sharing mechanism, all shadow images should be as equally important as possible.

Fig. 3.The relationship between secret images and shadow images in Chen and Wu’s method

The second drawback is that the shadow image Si is equal to Gi⊕Gi-1. If two secret images Gi and Gi-1 are not high entropy images, the partial secret images may be revealed. Although Chen and Wu have proposed a revised version, the reconstruction formula, Formula (5), of the revised version, this becomes a little complex. That is, the odd or even number state that the secret image belongs to should be checked before it is reconstructed. However, our proposed method does not need to perform this additional check.

The third drawback is related to the number of shared secret images. In Chen and Wu’s method, n secret images are shared into n+1 shadow images. However, our proposed method only needs to produce n shadow images, and n secret images can be shared to them. Therefore, the proposed method can share more secret images under the same number of shadow images.

3.2 The Sharing and Reconstruction Phases

In this subsection, the sharing and reconstruction phases are introduced. We use the same definitions of variables as Chen and Wu’s method to illustrate our proposed method. That is the variables Gi and Si are used to represent the i-th secret image and the i-th shadow image, respectively.

In order to make all shadow images as equally important as possible, the relationship between secret images and shadow images is modified in a circular way in our proposed method; as shown in Fig. 4. Through Fig. 4, it can be seen that the secret image Gi is reconstructed from performing an XOR operator on shadow images Si-1 and Si. Moreover, each shadow image is related to two secret images. Therefore, under this kind of topology, if the shadow image Si is not handed over, only two secret images can not be reconstructed. Note that this kind of topology is the aim of the proposed method. The proposed method achieves all parts in Fig. 4, except for the producing of G0. A small modification is needed, and the details are of this described in the following paragraphs.

Fig. 4.The aim of the proposed method

We now start to introduce our proposed method. There are four steps in the sharing phase of the proposed method. The flow chart of the proposed method is shown in Fig. 5.

Fig. 5.The flow chart of the proposed method

In the first step, a random integer matrix is produced. The way to generate the random integer matrix is shown in Fig. 6. More precisely, the proposed method takes the pixel at the center position of the first secret image as a seed to generate eight random integer numbers. These eight pixels of the first secret image are extracted by treating eight random integer numbers as position indicators. The eight pixels are concatenated as a 64-bit key (a seed of random number generator). This key is fed into the random number generator, called ‘‘Linear Feedback Shift Register,’’ to generate a sequence of bit stream. Assume the produced bit stream is the same as the result shown in the top-right corner of Fig. 6. The bit stream is then partitioned into segments with eight bits in each segment. For example, the first eight bits (10111010)2 are treated as the first segment and the second eight bits (10110101)2 are treated as the second segment and so on. The number of segments produced by the random number generator is equal to the number of pixels in the secret images. Since each segment contains eight bits, its value is an integer value in the range from 0 to 255. The segments are filled into a matrix R sequentially as its elements. Finally, the random integer matrix R can be obtained.

Fig. 6.The way to generate the random integer matrix R

In the second step, the modified secret image G'0 is produced. Except for the nine pixels (the center pixel and the eight pixels), the XOR operator is performed on the elements of matrix R and the pixels of the first secret image G0. The modified secret image G'0 can then be obtained. The procedure for producing the modified secret image G'0 is shown below:

In the third step, the middle shadow image S⌊n/2⌋ is produced according to Formula (7).

where variable n is the total number of secret images.

The other shadow images are produced in the fourth step. The shadow images can be divided into front and rear parts according to the middle shadow image S⌊n/2⌋. The process for producing the front part of the shadow images is not the same as the process for producing the rear part of the shadow images. The formula for producing those shadow images is shown in Formula (8).

Note that the middle shadow image has been produced in Formula (7). Therefore, the variable i in Formula (8) does not contain value ⌊n/2⌋. Finally, n shadow images can be obtained.

Through Formula (6)-(8), it can be seen that each shadow image contains the modified secret image G'0, andG'0 has become a random-like image after performing the XOR operator on the secret image G0 and the matrix R. According to the proof in [4], if a well-defined random number generator, such as a ‘‘Linear Feedback Shift Register’’[5], is adopted, the produced integers in the random integer matrix R will be random enough that each generated share image Si dose not contain any information. Therefore, all generated share image Si will become distinct and random-like image.

Here, the mechanism of ‘‘Linear Feedback Shift Register’’ is introduced roughly. At first, a seed is put into a register as an initial state. Each time, bits in the register are right shifted to produce one random bit. Moreover, the state in the register is changed simultaneously. More precisely, the right-most bit in the register is right shifted out as a produced random bit. For the state in the register, because the bits in the register are right shifted and the left-most bit becomes empty, the left-most bit should be reassigned to a new bit value. The new bit value comes from performing XOR on some bits in the predetermined positions in the register (referring to the polynomials of ‘‘Linear Feedback Shift Register’’). Then, the register with new state can be reached and it will be used to produce the next random bit next time.

We give a simple example to demonstrate our proposed method. Assume the variable n is equal to 5. That means there are five secret images, G0, G2, …, and G4. In the first step, the first secret image G0 is modified according to Formula (6) to obtain the modified secret image G'0. The second step is to produce the middle shadow image. Because the variable n is equal to 5, the middle shadow image represents the ⌊n/2⌋-th shadow image, that is, the shadow image S2. Therefore, the shadow image S2 is equal to G'0⊕G1⊕G2⊕G3⊕G4. The third step is to produce other shadow images. The shadow image S1 is derived from G2⊕S2 according to Formula (8). Because S2 contains G2, if we perform G2⊕S2 to get S1, the secret image G2 in S2 is eliminated. Therefore the shadow image S1 becomes G'0⊕G1⊕G3⊕G4. Similarly, S1 contains G1, and if we perform G1⊕S1 to get S0, the secret image G1 in S1 is eliminated. Therefore, the shadow image S0 becomes G'0⊕G3⊕G4. The shadow image S3 and S4 can also be derived according the induction described above. Finally, four shadow images S0, S1,…, and S4 can be produced as shown in Fig. 7.

Fig. 7.An example of the proposed method

The methods of reconstructing the secret images in the reconstruction phase are all the same except for the modified secret image G'0. The secret image and the modified secret image G'0 are reconstructed according to Formula (9) and Formula (10), respectively.

where the value i in Formula (9) is in the range of 1 to n-1.

After obtaining G'0 from Formula (10), the pixel at the center position of G'0 is extracted and taken as a seed to generate eight random integer numbers. The eight pixels of G'0 are extracted according to eight random integer numbers. The eight pixels are concatenated as a 64-bit key (a seed of a random number generator) to generate a random integer matrix R. Except for the nine pixels, the XOR operator is performed on the elements of matrix R and the pixels of G'0 to reconstruced the secret image G0 as shown below:

Finally, all secret images can be reconstructed according to the reconstruction phase of the proposed method.

There are two important points for the above reconstruction phase of the proposed method. The first one is that our aim is to reconstruct G0 from S0 and Sn-1 recalling the descriptions in Fig. 4. However, in our proposed method, we still need a little help from an additional shadow image S⌊n/2⌋. It is a minor flaw in our proposed method. However, with this exception the proposed method achieves the aim of Fig. 4. The second point is how the i-th secret image Gi and modified secret image G'0 can be reconstructed through Formula (9) and Formula (10), respectively. We prove them in Theorem 1 and Theorem 2, respectively.

Theorem 1. The i-th secret image Gi can be reconstructed by Si-1⊕Si.

Proof. According to Formula (8) where Gi orginates, we divide this problem into two cases. In the first case, if 0 ≤ i < ⌊n/2⌋, then Si =Gi+1⊕Si+1 through Formula (8). It can be shown that Gi+1= Si⊕Si+1. We reassign the value i+1 to y. The statement becomes; if 1 ≤ y < ⌊n/2⌋+1, then Gy= Sy-1⊕Sy. Through the first case, it can be shown that G1, G2, …, and G⌊n/2⌋ satisfy Formula (9). In the second case, if ⌊n/2⌋ < i ≤ n-1, then Si =Gi⊕Si-1 through Formula (8). It can be shown that Gi= Si-1⊕Si. Through the second case, it can be shown that G⌊n/2⌋+1, G⌊n/2⌋+2, …, and Gn-1 satisfy the Formula (9). Combining two cases, it can be proved that Gi= Si-1⊕Si, when i is in the range from 1 to n-1.

Theorem 2. The modified secret image G'0 can be reconstructed by S0⊕Sn-1⊕S⌊n/2⌋.

Proof. Based on Formula (7), the shadow image S⌊n/2⌋ is equal to G'0⊕G1⊕G2⊕…⊕Gn-1. Moreover, based on Theorem 1, the secret image Gi can be substituted by Si-1⊕Si. This means the shadow image S⌊n/2⌋ is equal to G'0⊕G1⊕G2⊕…⊕Gn-1= G'0⊕(S0⊕S1)⊕(S1⊕S2)⊕…⊕(Sn-2⊕Sn-1), that is, S⌊n/2⌋= G'0⊕S0⊕Sn-1. Finally, it can be proved that G'0 = S0⊕Sn-1⊕S⌊n/2⌋.

 

4. Experimental Results

The experimental results are demonstrated in this section. Real images were used to perform the proposed method. Four grayscale images were selected as secret images, including Plane, Lena, Pepper, and Baboon as shown in Fig. 8. The size of each cover image was 512×512 pixels. They were used to represent the secret images G0, G1, G2 and G3. The four shadow images are shown in Fig. 9.

Fig. 8.The secret images

Fig. 9.The shadow images

From Fig. 9, it can be seen that no partial secret information is revealed. All four shadow images are random-like images. The reason is that each shadow image contains the modified secret image G'0, and G'0 is a random-like image. Therefore, all shadow images become random-like images. This means we do not need to worry about whether the secret images are low entropy images or not. The reconstructed images, because they are exactly the same as the original secret images shown in Fig. 8, are not shown in this manuscript.

The comparisons among different methods are in Table 1. Among those comparisons, “Sharing Capacity” defined by Chen and Wu [4] are shown as follows:

Table 1.Comparisons among different methods

The larger the value of the sharing capacity, the better is the sharing method. In Chen and Wu’s method [4], n secret images are shared into n+1 shadow images and their method dose not expand the pixels. Therefore, the Sharing Capacity of Chen and Wu’s method [4] is n/(n+1). Moreover, in Guo et al.’s method [6] each share value derived from one secret pixel is encoded by fifteen bits. Therefore, its “Pixel Expansion” is 15/8. As for Chen’s method [1], the size of shadows related to the number of shadows. If the number of shadows is n, the size of shadows becomes 1/n. That is why we mark ‘*’ in the “Pixel Expansion” field. Finally, the method proposed here shares n secret images into n shadow images and does not need to expand pixels either. Therefore, the sharing capacity of the proposed method is n/n, that is, 1.

In the following paragraphs we demonstrate the importance of the role of all shadow images in the related method and the proposed method. The values in Table 2 represent the total number of secret images that are affected by the corresponding shadow images. For example, in Chen and Wu’s method, there are n secret images that are affected by the shadow image S1. This means that if the participant who owns the shadow image S1 does not want to cooperate with other participants, all n secret images can not be reconstructed. In Wang et al.’s method [17] and Wu’s method [4], their values are marked as ‘*’ because both two methods produce shares from only “one” secret image. Under this situation, this secret image is affected by all shares. Therefore, their values in Table 2 are all 1 with star symbol ‘*’. Moreover, the value of S⌊n/2⌋ for our proposed method in Table 2 is equal to 3. This is because the proposed method needed S0, Sn-1 and S⌊n/2⌋ to reconstruct the modified secret image G'0, which means the modified secret image G'0 is also affected by S⌊n/2⌋. Therefore, there are three secret images that are affected by the shadow image S⌊n/2⌋.

Table 2.The number of secret images that are affected by the shadow images

Another point is that the total number of shadow images that are used to share n secret images is n+1 in Chen and Wu’s method. This number is n in Guo et al.’s method and the proposed method. Therefore, Guo et al.’s method and the proposed method do not produce shadow image Sn. That is why there is no value in shadow image Sn for Guo et al.’s method and the proposed method in Table 2. And, we mark ‘X’ at the corresponding positions in Table 2 to indicate this situation.

Just as we discussed in Subsection 3.1, all shadow images should be as equally important as possible in the aspect of secret sharing. Thus it is better when the values in Table 2 are as equal as possible. Through the values in Table 2 it can be seen that almost all values in the proposed method are equal to 2. Therefore, the shadow images produced by our proposed method are more equally important than those produced by other methods. Although Guo et al.’s method [6] achieves equally important shadow images totally, the method causes pixel expansion and the computation complexity is larger than the proposed method by referring Table 1.

 

5. Conclusion

In this paper the drawbacks of Chen and Wu’s method are addressed. The first drawback is that the produced shadow images are not equally important. To overcome this, the proposed method modifies Chen and Wu’s approach so that the relationship between the shadows images and secret images are modified in a circular way. Each shadow image only relates to two secret images. Therefore, the shadow images produced by the proposed method are equally important. The second drawback of Chen and Wu’s method is that if the secret images are low entropy images, the reconstruction phase should check whether the reconstructed secret image belongs to the odd or even number state. However, in the proposed method, the reconstruction phase is consistent no matter what number state the secret image belongs to. The third drawback is that the Sharing Capacity of Chen and Wu’s method is n/(n+1). However, that of the proposed method is n/n, that is, 1. This means the proposed method can share more secret images compared to Chen and Wu’s method under the same number of shadow images. Moreover, through the comparisons between our proposed method and other related methods in Table 1 and 2, it can be concluded that the proposed method is better than other related methods.

References

  1. W. K. Chen, "Image Sharing Method for Gray-level Images," Journal of Systems and Software, vol. 86, no. 2, pp. 581-585, 2013. https://doi.org/10.1016/j.jss.2012.09.040
  2. J. Chen, Y. S. Chen, H. C. Hsu, and H. W. Chen, "New Visual Cryptography System Based on Circular Shadow Image and Fixed Angle Segmentation," Journal of Electronic Imaging, vol. 14, no. 3, pp. 0330181 - 033018-5, 2005.
  3. D. Catalano and R. Gennaro, "New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications," Journal of Computer and System Sciences, vol. 61, no. 1, pp. 51-80, 2000. https://doi.org/10.1006/jcss.1999.1685
  4. T. H. Chen and C. S. Wu, "Efficient Multi-secret Image Sharing based on Boolean Operations," Signal Processing, vol. 91, pp. 90-97, 2011. https://doi.org/10.1016/j.sigpro.2010.06.012
  5. D. W. Clark and L. J. Weng, "Maximal and Near-Maximal Shift Register Sequences: Efficient Event Counters and Easy Discrete Logarithms," IEEE Transactions on Computers, vol. 43, no. 5, pp. 560-568, 1994. https://doi.org/10.1109/12.280803
  6. C. Guo, C. C. Chang, N. Ma, and C. Qin, "A Multi-threshold Secret Image Sharing Scheme Based on MSP," Pattern Recognition Letters, vol. 33, pp. 1594-1600, 2012. https://doi.org/10.1016/j.patrec.2012.04.010
  7. C. C. Lin and W. H. Tsai, "Secret Image Sharing with Steganography and Authentication," Journal of Systems and Software, vol. 73, vol. 3, pp. 405-414, 2004. https://doi.org/10.1016/S0164-1212(03)00239-5
  8. J. Nam, M. Kim, J. Paik, and D. Won, "Security weaknesses in Harn-Lin and Dutta-Barua Protocols for Group Key Establishment," KSII Transactions on Internet and Information Systems, vol. 6, no. 2, pp. 751-765, 2012.
  9. M. Naor and A. Shamir, "Visual Cryptography," Lecture Notes in Computer Science, vol. 950, pp. 1-12, 1994.
  10. A. Shamir, "How to Share a Secret," Communication of the ACM, vol. 22, no. 11, pp. 612-613, 1979. https://doi.org/10.1145/359168.359176
  11. S. J. Shyu, S. Y. Huang, Y. K. Lee, and R. Z. Wang, "Sharing Multiple Secrets in Visual Cryptography," Pattern Recognition, vol. 40, no. 12, pp. 3633-3651, 2007. https://doi.org/10.1016/j.patcog.2007.03.012
  12. C. C. Thien, and J. C. Lin, "Secret Image Sharing," Computer & Graphics, vol. 26, pp. 765-770, 2002. https://doi.org/10.1016/S0097-8493(02)00131-0
  13. C. C. Wu and L. H. Chen, "A Study on Visual Cryptography," Master Thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, 1998. H. C. Wu and C. C. Chang, "Sharing Visual Multi-secrets using Circle Shares," Computer Standards & Interfaces, vol. 134, no. 28, pp. 123-135, 2005.
  14. C. H. Wang, and T. Hwang, "(t,m) Threshold and Generalized ID-based Conference Key Distribution System," Applied Mathematics and Computation, vol. 112, no. 2-3, pp. 181-191, 2000. https://doi.org/10.1016/S0096-3003(99)00041-7
  15. G. Wei, X. Yang, and J. Shao, "Efficient Certificateless Authenticated Asymmetric Group Key Agreement Protocol," KSII Transactions on Internet and Information Systems, vol. 6, no. 12, pp. 3352-3365, 2012.
  16. D. Wang, L. Zhang N. Ma, and X. Li, "Two Secret Sharing Schemes Based on Boolean Operations," Pattern Recognition, vol. 40, no. 10, pp. 2776-2785, 2007. https://doi.org/10.1016/j.patcog.2006.11.018
  17. W. J. Zhang, "Robust Multiparty Quantum Secret Key Sharing over Two Collective-noise Channels," Physical A: Statistical Mechanics and its Applications, vol. 361, no. 1, pp. 233-238, 2006. https://doi.org/10.1016/j.physa.2005.07.005

Cited by

  1. A survey paper on secret image sharing schemes vol.8, pp.4, 2014, https://doi.org/10.1007/s13735-018-0161-3