A New Approach to Image Sharing with High-Security Threshold Structure
Image sharing is an attractive research subject in computer image techniques and in the information security field. This article presents a novel scheme of image sharing with a ( t , n ) high-security threshold structure. The scheme can encode secret images into n shadow images in such a way that al...
Saved in:
| Published in | Journal of the ACM Vol. 61; no. 6; pp. 1 - 19 |
|---|---|
| Main Authors | , , , |
| Format | Journal Article |
| Language | English |
| Published |
New York
Association for Computing Machinery
01.11.2014
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 0004-5411 1557-735X |
| DOI | 10.1145/2666470 |
Cover
| Abstract | Image sharing is an attractive research subject in computer image techniques and in the information security field. This article presents a novel scheme of image sharing with a ( t , n ) high-security threshold structure. The scheme can encode secret images into n shadow images in such a way that all the shadow images are in a perfect and ideal ( t , n ) threshold structure, while each shadow image has its own visual content assigned at random. The most common method to implement image sharing is based on interpolation polynomial over the field F p ={0, 1, 2,…, p -1} [Shamir 1979]. In this article, the authors present a new approach to image sharing and its computation based on algebraic-geometry code over the pixel value field GF(2 m ). |
|---|---|
| AbstractList | Image sharing is an attractive research subject in computer image techniques and in the information security field. This article presents a novel scheme of image sharing with a ( t , n ) high-security threshold structure. The scheme can encode secret images into n shadow images in such a way that all the shadow images are in a perfect and ideal ( t , n ) threshold structure, while each shadow image has its own visual content assigned at random. The most common method to implement image sharing is based on interpolation polynomial over the field F p ={0, 1, 2,…, p -1} [Shamir 1979]. In this article, the authors present a new approach to image sharing and its computation based on algebraic-geometry code over the pixel value field GF(2 m ). Image sharing is an attractive research subject in computer image techniques and in the information security field. This article presents a novel scheme of image sharing with a (t, n) high-security threshold structure. The scheme can encode secret images into n shadow images in such a way that all the shadow images are in a perfect and ideal (t, n) threshold structure, while each shadow image has its own visual content assigned at random. The most common method to implement image sharing is based on interpolation polynomial over the field Fp={0, 1, 2,..., p-1} [Shamir 1979]. In this article, the authors present a new approach to image sharing and its computation based on algebraic-geometry code over the pixel value field GF(2m). (ProQuest: ... denotes formulae/symbols omitted.) Image sharing is an attractive research subject in computer image techniques and in the information security field. This article presents a novel scheme of image sharing with a (t, n) high-security threshold structure. The scheme can encode secret images into n shadow images in such a way that all the shadow images are in a perfect and ideal (t, n) threshold structure, while each shadow image has its own visual content assigned at random. The most common method to implement image sharing is based on interpolation polynomial over the field F sub(p)={0, 1, 2,..., p-1} [Shamir 1979]. In this article, the authors present a new approach to image sharing and its computation based on algebraic-geometry code over the pixel value field GF(2 super()m. |
| Author | Fang, Jiajia Yuan, Qizhao Wang, Xiaojing Cai, Hongliang |
| Author_xml | – sequence: 1 givenname: Xiaojing surname: Wang fullname: Wang, Xiaojing organization: Chengdu Institute of Computer Applications, Chinese Academy of Sciences, Chengdu, P.R. China – sequence: 2 givenname: Qizhao surname: Yuan fullname: Yuan, Qizhao organization: Chengdu Institute of Computer Applications, Chinese Academy of Sciences, Chengdu, P.R. China – sequence: 3 givenname: Hongliang surname: Cai fullname: Cai, Hongliang organization: Chengdu Institute of Computer Applications, Chinese Academy of Sciences, Chengdu, P.R. China – sequence: 4 givenname: Jiajia surname: Fang fullname: Fang, Jiajia organization: Chengdu Institute of Computer Applications, Chinese Academy of Sciences, Chengdu, P.R. China |
| BookMark | eNpl0EFLwzAYBuAgCm5T_AsBD3qpJmmTZscxnBsMPWyCt5KmX9eMrplJyti_N7Kd5unjhYePl3eIrjvbAUIPlLxQmvFXJoTIcnKFBpTzPMlT_n2NBoSQLOEZpbdo6P02RsJIPkCzCf6AA57s984q3eBg8WKnNoBXjXKm2-CDCQ2em02TrED3zoQjXjcOfGPbCq-C63XoHdyhm1q1Hu7Pd4S-Zm_r6TxZfr4vppNlopkUIQENJaOprPJ0LHg5BpVBJXOuRUkJr1kVU1pnvBJUloJTQVRNSs1zxjhXUqUj9Hz6G-v-9OBDsTNeQ9uqDmzvCyqJpFSysYj08YJube-62K6gIpVyTOJaUT2dlHbWewd1sXdmp9yxoKT427M47xllciG1CSoY2wWnTPvP_wI_anXy |
| CODEN | JACOAH |
| CitedBy_id | crossref_primary_10_1016_j_jisa_2018_03_009 crossref_primary_10_1016_j_ijimpeng_2015_10_015 crossref_primary_10_1080_02533839_2017_1294994 |
| Cites_doi | 10.1016/S0304-3975(99)00127-9 10.1016/j.patrec.2005.09.021 10.1109/ISDA.2008.130 10.1145/359168.359176 10.1109/18.720550 10.1016/j.patrec.2003.12.011 10.1109/TCSVT.2003.819176 10.1109/TIP.2003.819861 10.1016/j.patcog.2004.01.002 10.1016/j.patcog.2005.06.010 10.1142/S0218001402001770 10.1016/j.cpc.2005.07.002 10.1006/inco.1996.0076 10.1093/comjnl/bxh152 10.1016/S0020-0255(98)10011-7 10.1016/j.patcog.2006.11.018 10.1109/TSP.2003.809376 10.1007/BF01398012 10.1016/S0031-3203(02)00258-3 10.1109/MARK.1979.8817296 10.1023/A:1011271120274 10.1017/CBO9780511525926 10.1145/358746.358762 10.1016/0167-4048(94)90097-3 10.1109/TIP.2005.859378 10.1016/j.jss.2004.07.250 10.1109/TIP.2006.875249 10.1016/S0097-8493(02)00131-0 10.1016/S0020-0190(00)00108-3 10.1016/j.ins.2007.12.016 10.1016/S0164-1212(02)00034-1 10.5555/647595 10.1016/S0097-8493(98)00034-X |
| ContentType | Journal Article |
| Copyright | Copyright Association for Computing Machinery Nov 2014 |
| Copyright_xml | – notice: Copyright Association for Computing Machinery Nov 2014 |
| DBID | AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
| DOI | 10.1145/2666470 |
| DatabaseName | CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | CrossRef Computer and Information Systems Abstracts Computer and Information Systems Abstracts |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1557-735X |
| EndPage | 19 |
| ExternalDocumentID | 3533512301 10_1145_2666470 |
| Genre | Feature |
| GroupedDBID | --Z -DZ -~X .DC 29L 3R3 4.4 5GY 5VS 85S 8US 8VB AAHTB AAIKC AAKMM AALFJ AAMNW AAYFX AAYXX ABCQX ABFSI ABPEJ ABPPZ ACGOD ACM ACNCT ADBCU ADL ADMLS AEBYY AEFXT AEGXH AEJOY AEMOZ AENEX AENSD AFWIH AFWXC AGHSJ AHQJS AIKLT AKRVB AKVCP ALMA_UNASSIGNED_HOLDINGS AMVHM ASPBG AVWKF BDXCO CCLIF CITATION CS3 D0L DU5 EBS EJD FEDTE GUFHI HGAVV H~9 IAO ICD IEA IOF K1G L7B LHSKQ P1C PQQKQ QWB RNS TAE TH9 TN5 UKR UPT WH7 XSW YQT ZCA ZL0 7SC 8FD JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-c286t-eceb2138d73965b9ea4ed875c6b105f2ded83f45d618b65160af0bc572255a8a3 |
| ISSN | 0004-5411 |
| IngestDate | Fri Jul 11 15:04:43 EDT 2025 Mon Jun 30 05:39:40 EDT 2025 Wed Oct 01 06:01:14 EDT 2025 Thu Apr 24 23:07:47 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 6 |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c286t-eceb2138d73965b9ea4ed875c6b105f2ded83f45d618b65160af0bc572255a8a3 |
| Notes | SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 14 ObjectType-Article-1 ObjectType-Feature-2 content type line 23 |
| PQID | 1638890145 |
| PQPubID | 47580 |
| PageCount | 19 |
| ParticipantIDs | proquest_miscellaneous_1808118296 proquest_journals_1638890145 crossref_primary_10_1145_2666470 crossref_citationtrail_10_1145_2666470 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2014-11-01 |
| PublicationDateYYYYMMDD | 2014-11-01 |
| PublicationDate_xml | – month: 11 year: 2014 text: 2014-11-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York |
| PublicationTitle | Journal of the ACM |
| PublicationYear | 2014 |
| Publisher | Association for Computing Machinery |
| Publisher_xml | – name: Association for Computing Machinery |
| References | Chang C. C. (e_1_2_1_15_1) Katzenbeisser S. (e_1_2_1_26_1) 2000; 28 Hou Y. C. (e_1_2_1_23_1) 2004; 109 e_1_2_1_20_1 e_1_2_1_41_1 e_1_2_1_45_1 e_1_2_1_43_1 e_1_2_1_28_1 e_1_2_1_49_1 e_1_2_1_47_1 Naor M. (e_1_2_1_32_1) 1995 e_1_2_1_31_1 e_1_2_1_6_1 e_1_2_1_12_1 e_1_2_1_35_1 e_1_2_1_4_1 e_1_2_1_10_1 e_1_2_1_33_1 e_1_2_1_16_1 e_1_2_1_39_1 Blakley G. R. (e_1_2_1_8_1) e_1_2_1_14_1 Thein C. C. (e_1_2_1_37_1) 2006; 6 e_1_2_1_18_1 Su Z. M. (e_1_2_1_36_1) 1996; 19 e_1_2_1_42_1 e_1_2_1_46_1 e_1_2_1_21_1 e_1_2_1_44_1 Ateniese G. (e_1_2_1_2_1) 1996; 1099 e_1_2_1_27_1 Massey J. L. (e_1_2_1_30_1) 1993 Hou Y. C. (e_1_2_1_24_1) 2000; 9 e_1_2_1_48_1 e_1_2_1_29_1 Hou Y. C. (e_1_2_1_22_1); 16 Ito R. (e_1_2_1_25_1) 1999; 82 Tsai C. S. (e_1_2_1_40_1) e_1_2_1_7_1 e_1_2_1_5_1 e_1_2_1_3_1 e_1_2_1_13_1 e_1_2_1_34_1 e_1_2_1_1_1 e_1_2_1_11_1 e_1_2_1_17_1 e_1_2_1_38_1 e_1_2_1_9_1 e_1_2_1_19_1 |
| References_xml | – ident: e_1_2_1_4_1 doi: 10.1016/S0304-3975(99)00127-9 – ident: e_1_2_1_44_1 doi: 10.1016/j.patrec.2005.09.021 – ident: e_1_2_1_46_1 doi: 10.1109/ISDA.2008.130 – volume: 16 volume-title: Proceedings of the International Conference on Imaging Science, Systems and Technology (CISST'01) ident: e_1_2_1_22_1 – ident: e_1_2_1_33_1 doi: 10.1145/359168.359176 – volume-title: Proceedings of the 6th Joint Swedish-Russian International Workshop on Information Theory. Citeseer, 276--279 year: 1993 ident: e_1_2_1_30_1 – volume: 1099 start-page: 416 year: 1996 ident: e_1_2_1_2_1 article-title: Constructions and bounds for visual cryptography publication-title: Autom. Lang. Program. – ident: e_1_2_1_6_1 doi: 10.1109/18.720550 – ident: e_1_2_1_48_1 doi: 10.1016/j.patrec.2003.12.011 – ident: e_1_2_1_12_1 – ident: e_1_2_1_39_1 doi: 10.1109/TCSVT.2003.819176 – ident: e_1_2_1_45_1 doi: 10.1109/TIP.2003.819861 – ident: e_1_2_1_47_1 doi: 10.1016/j.patcog.2004.01.002 – ident: e_1_2_1_35_1 doi: 10.1016/j.patcog.2005.06.010 – volume: 28 start-page: 1 year: 2000 ident: e_1_2_1_26_1 article-title: Information hiding techniques for steganography and digital watermarking publication-title: EDP Audit, Control, and Security Newslet. – ident: e_1_2_1_16_1 doi: 10.1142/S0218001402001770 – ident: e_1_2_1_1_1 doi: 10.1016/j.cpc.2005.07.002 – volume: 9 start-page: 89 year: 2000 ident: e_1_2_1_24_1 article-title: A new approach on 256 color secret image sharing technique publication-title: MIS Review – ident: e_1_2_1_3_1 doi: 10.1006/inco.1996.0076 – volume: 109 start-page: 95 year: 2004 ident: e_1_2_1_23_1 article-title: Visual cryptography techniques for color images without pixel expansion publication-title: J. Inf. Tech. Soc. – volume-title: Proceedings of the IEEE International Symposium on Information Theory. IEEE ident: e_1_2_1_8_1 – ident: e_1_2_1_17_1 doi: 10.1093/comjnl/bxh152 – volume-title: Proceedings of the International Conference on Communication Technology (ICCT'03) ident: e_1_2_1_15_1 – ident: e_1_2_1_13_1 doi: 10.1016/S0020-0255(98)10011-7 – ident: e_1_2_1_43_1 doi: 10.1016/j.patcog.2006.11.018 – ident: e_1_2_1_20_1 doi: 10.1109/TSP.2003.809376 – ident: e_1_2_1_42_1 doi: 10.1007/BF01398012 – ident: e_1_2_1_21_1 doi: 10.1016/S0031-3203(02)00258-3 – ident: e_1_2_1_7_1 doi: 10.1109/MARK.1979.8817296 – ident: e_1_2_1_29_1 – volume: 82 start-page: 2172 year: 1999 ident: e_1_2_1_25_1 article-title: Image size invariant visual cryptography publication-title: IEICE Trans. Fund. Electon. Commun. Comput. Sci. E Ser. A – ident: e_1_2_1_9_1 doi: 10.1023/A:1011271120274 – volume: 19 start-page: 293 year: 1996 ident: e_1_2_1_36_1 article-title: The arbitrary share of visual secrets publication-title: Chinese J. Comput. – ident: e_1_2_1_27_1 doi: 10.1017/CBO9780511525926 – volume-title: Proceedings of the Advances in Multimedia Information Processing (PCM'01) ident: e_1_2_1_40_1 – ident: e_1_2_1_31_1 doi: 10.1145/358746.358762 – ident: e_1_2_1_18_1 doi: 10.1016/0167-4048(94)90097-3 – volume-title: Cryptology: Eurocrypt'94 year: 1995 ident: e_1_2_1_32_1 – ident: e_1_2_1_34_1 doi: 10.1109/TIP.2005.859378 – volume: 6 start-page: 219 year: 2006 ident: e_1_2_1_37_1 article-title: Sharing secret images by using base-transform and small-size host images publication-title: Int. J. Comput. Sci. Netw. Secur. – ident: e_1_2_1_19_1 doi: 10.1016/j.jss.2004.07.250 – ident: e_1_2_1_49_1 doi: 10.1109/TIP.2006.875249 – ident: e_1_2_1_38_1 doi: 10.1016/S0097-8493(02)00131-0 – ident: e_1_2_1_11_1 doi: 10.1016/S0020-0190(00)00108-3 – ident: e_1_2_1_14_1 doi: 10.1016/j.ins.2007.12.016 – ident: e_1_2_1_41_1 doi: 10.1016/S0164-1212(02)00034-1 – ident: e_1_2_1_5_1 doi: 10.5555/647595 – ident: e_1_2_1_10_1 doi: 10.1016/S0097-8493(98)00034-X – ident: e_1_2_1_28_1 |
| SSID | ssj0000207 |
| Score | 2.110927 |
| Snippet | Image sharing is an attractive research subject in computer image techniques and in the information security field. This article presents a novel scheme of... |
| SourceID | proquest crossref |
| SourceType | Aggregation Database Enrichment Source Index Database |
| StartPage | 1 |
| SubjectTerms | Computer information security Data encryption Information sharing Interpolation Pixels Polynomials Shadows Studies Thresholds Visual |
| Title | A New Approach to Image Sharing with High-Security Threshold Structure |
| URI | https://www.proquest.com/docview/1638890145 https://www.proquest.com/docview/1808118296 |
| Volume | 61 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVEBS databaseName: EBSCOhost Mathematics Source - HOST customDbUrl: eissn: 1557-735X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000207 issn: 0004-5411 databaseCode: AMVHM dateStart: 20040301 isFulltext: true titleUrlDefault: https://www.ebsco.com/products/research-databases/mathematics-source providerName: EBSCOhost – providerCode: PRVEBS databaseName: Inspec with Full Text customDbUrl: eissn: 1557-735X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000207 issn: 0004-5411 databaseCode: ADMLS dateStart: 20040301 isFulltext: true titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text providerName: EBSCOhost |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3Nb9MwFLdKd-HC-BSFgYyEdkGGJrGd9BhNq8q0DiFS1FtkO47oBE2ntZf9DfzRvBc7SSMqBFyiNrGsxO_n957fJyFvdRRZEHQFg2NXyHhsEqYTKdhYBbCbIiyoXkdbXMnZgl8sxXIw-LkXtbTb6vfm7mBeyf9QFe4BXTFL9h8o204KN-A30BeuQGG4_hWN0zo8Md10aVEff2AMDlZhbo2sGMnBvvg2de8yoN0tupzQH70zTUGRA_ppnXNy1hlmvGF5uVLVdSPv6o5ezoT6eXX3TVWdS8N1w64wS1h1o6d-louVul6pfZNDwH3uXQuSDjh1LKTrP4GfNa8DQJtk7oblcia456jWc1kRszgSy3027Gqye7jt89TgMKfnWBQD1AvJXeeRfi3tq0_5dHF5mWfny6z_1Mlu0HJB1QHudrq5YdiDDH31viHLPXIUgowYD8lROv86m3eSPXTp980nuSRsfJUP_kX62k1fuNcaS_aQPPCkpKnDzSMysOvH5Lhp40E9V39CpikFGNEGRnRb0RpG1MOIIoxoD0a0hRFtYfSULKbn2dmM-fYazISJ3DJrrA6DKCniaCKFnljFbQHHVyM1KN1lWMC_qOSikEGipQjkWJVjbUQMIkCoREXPyHBdre1zQiMTWxuDdluaiMOmVyBIJqWQBZoLhC5H5LRZltz42vPYAuV77vLiRe7Xb0RoO3Djyq38PuSkWdfc78XbHE8VCUYEiBF50z4GTonuL7W21Q7GYJMZOE5P5Is_T_GS3O9Qf0KGsI72FaieW_3aI-IX-7GFKQ |
| linkProvider | EBSCOhost |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+New+Approach+to+Image+Sharing+with+High-Security+Threshold+Structure&rft.jtitle=Journal+of+the+ACM&rft.au=Wang%2C+Xiaojing&rft.au=Yuan%2C+Qizhao&rft.au=Cai%2C+Hongliang&rft.au=Fang%2C+Jiajia&rft.date=2014-11-01&rft.pub=Association+for+Computing+Machinery&rft.issn=0004-5411&rft.eissn=1557-735X&rft.volume=61&rft.issue=6&rft.spage=1&rft_id=info:doi/10.1145%2F2666470&rft.externalDBID=NO_FULL_TEXT&rft.externalDocID=3533512301 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0004-5411&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0004-5411&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0004-5411&client=summon |