A New Approach to Image Sharing with High-Security Threshold Structure

Image sharing is an attractive research subject in computer image techniques and in the information security field. This article presents a novel scheme of image sharing with a ( t , n ) high-security threshold structure. The scheme can encode secret images into n shadow images in such a way that al...

Full description

Saved in:
Bibliographic Details
Published inJournal of the ACM Vol. 61; no. 6; pp. 1 - 19
Main Authors Wang, Xiaojing, Yuan, Qizhao, Cai, Hongliang, Fang, Jiajia
Format Journal Article
LanguageEnglish
Published New York Association for Computing Machinery 01.11.2014
Subjects
Online AccessGet full text
ISSN0004-5411
1557-735X
DOI10.1145/2666470

Cover

Abstract Image sharing is an attractive research subject in computer image techniques and in the information security field. This article presents a novel scheme of image sharing with a ( t , n ) high-security threshold structure. The scheme can encode secret images into n shadow images in such a way that all the shadow images are in a perfect and ideal ( t , n ) threshold structure, while each shadow image has its own visual content assigned at random. The most common method to implement image sharing is based on interpolation polynomial over the field F p ={0, 1, 2,…, p -1} [Shamir 1979]. In this article, the authors present a new approach to image sharing and its computation based on algebraic-geometry code over the pixel value field GF(2 m ).
AbstractList Image sharing is an attractive research subject in computer image techniques and in the information security field. This article presents a novel scheme of image sharing with a ( t , n ) high-security threshold structure. The scheme can encode secret images into n shadow images in such a way that all the shadow images are in a perfect and ideal ( t , n ) threshold structure, while each shadow image has its own visual content assigned at random. The most common method to implement image sharing is based on interpolation polynomial over the field F p ={0, 1, 2,…, p -1} [Shamir 1979]. In this article, the authors present a new approach to image sharing and its computation based on algebraic-geometry code over the pixel value field GF(2 m ).
Image sharing is an attractive research subject in computer image techniques and in the information security field. This article presents a novel scheme of image sharing with a (t, n) high-security threshold structure. The scheme can encode secret images into n shadow images in such a way that all the shadow images are in a perfect and ideal (t, n) threshold structure, while each shadow image has its own visual content assigned at random. The most common method to implement image sharing is based on interpolation polynomial over the field Fp={0, 1, 2,..., p-1} [Shamir 1979]. In this article, the authors present a new approach to image sharing and its computation based on algebraic-geometry code over the pixel value field GF(2m). (ProQuest: ... denotes formulae/symbols omitted.)
Image sharing is an attractive research subject in computer image techniques and in the information security field. This article presents a novel scheme of image sharing with a (t, n) high-security threshold structure. The scheme can encode secret images into n shadow images in such a way that all the shadow images are in a perfect and ideal (t, n) threshold structure, while each shadow image has its own visual content assigned at random. The most common method to implement image sharing is based on interpolation polynomial over the field F sub(p)={0, 1, 2,..., p-1} [Shamir 1979]. In this article, the authors present a new approach to image sharing and its computation based on algebraic-geometry code over the pixel value field GF(2 super()m.
Author Fang, Jiajia
Yuan, Qizhao
Wang, Xiaojing
Cai, Hongliang
Author_xml – sequence: 1
  givenname: Xiaojing
  surname: Wang
  fullname: Wang, Xiaojing
  organization: Chengdu Institute of Computer Applications, Chinese Academy of Sciences, Chengdu, P.R. China
– sequence: 2
  givenname: Qizhao
  surname: Yuan
  fullname: Yuan, Qizhao
  organization: Chengdu Institute of Computer Applications, Chinese Academy of Sciences, Chengdu, P.R. China
– sequence: 3
  givenname: Hongliang
  surname: Cai
  fullname: Cai, Hongliang
  organization: Chengdu Institute of Computer Applications, Chinese Academy of Sciences, Chengdu, P.R. China
– sequence: 4
  givenname: Jiajia
  surname: Fang
  fullname: Fang, Jiajia
  organization: Chengdu Institute of Computer Applications, Chinese Academy of Sciences, Chengdu, P.R. China
BookMark eNpl0EFLwzAYBuAgCm5T_AsBD3qpJmmTZscxnBsMPWyCt5KmX9eMrplJyti_N7Kd5unjhYePl3eIrjvbAUIPlLxQmvFXJoTIcnKFBpTzPMlT_n2NBoSQLOEZpbdo6P02RsJIPkCzCf6AA57s984q3eBg8WKnNoBXjXKm2-CDCQ2em02TrED3zoQjXjcOfGPbCq-C63XoHdyhm1q1Hu7Pd4S-Zm_r6TxZfr4vppNlopkUIQENJaOprPJ0LHg5BpVBJXOuRUkJr1kVU1pnvBJUloJTQVRNSs1zxjhXUqUj9Hz6G-v-9OBDsTNeQ9uqDmzvCyqJpFSysYj08YJube-62K6gIpVyTOJaUT2dlHbWewd1sXdmp9yxoKT427M47xllciG1CSoY2wWnTPvP_wI_anXy
CODEN JACOAH
CitedBy_id crossref_primary_10_1016_j_jisa_2018_03_009
crossref_primary_10_1016_j_ijimpeng_2015_10_015
crossref_primary_10_1080_02533839_2017_1294994
Cites_doi 10.1016/S0304-3975(99)00127-9
10.1016/j.patrec.2005.09.021
10.1109/ISDA.2008.130
10.1145/359168.359176
10.1109/18.720550
10.1016/j.patrec.2003.12.011
10.1109/TCSVT.2003.819176
10.1109/TIP.2003.819861
10.1016/j.patcog.2004.01.002
10.1016/j.patcog.2005.06.010
10.1142/S0218001402001770
10.1016/j.cpc.2005.07.002
10.1006/inco.1996.0076
10.1093/comjnl/bxh152
10.1016/S0020-0255(98)10011-7
10.1016/j.patcog.2006.11.018
10.1109/TSP.2003.809376
10.1007/BF01398012
10.1016/S0031-3203(02)00258-3
10.1109/MARK.1979.8817296
10.1023/A:1011271120274
10.1017/CBO9780511525926
10.1145/358746.358762
10.1016/0167-4048(94)90097-3
10.1109/TIP.2005.859378
10.1016/j.jss.2004.07.250
10.1109/TIP.2006.875249
10.1016/S0097-8493(02)00131-0
10.1016/S0020-0190(00)00108-3
10.1016/j.ins.2007.12.016
10.1016/S0164-1212(02)00034-1
10.5555/647595
10.1016/S0097-8493(98)00034-X
ContentType Journal Article
Copyright Copyright Association for Computing Machinery Nov 2014
Copyright_xml – notice: Copyright Association for Computing Machinery Nov 2014
DBID AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
DOI 10.1145/2666470
DatabaseName CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList CrossRef
Computer and Information Systems Abstracts
Computer and Information Systems Abstracts
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1557-735X
EndPage 19
ExternalDocumentID 3533512301
10_1145_2666470
Genre Feature
GroupedDBID --Z
-DZ
-~X
.DC
29L
3R3
4.4
5GY
5VS
85S
8US
8VB
AAHTB
AAIKC
AAKMM
AALFJ
AAMNW
AAYFX
AAYXX
ABCQX
ABFSI
ABPEJ
ABPPZ
ACGOD
ACM
ACNCT
ADBCU
ADL
ADMLS
AEBYY
AEFXT
AEGXH
AEJOY
AEMOZ
AENEX
AENSD
AFWIH
AFWXC
AGHSJ
AHQJS
AIKLT
AKRVB
AKVCP
ALMA_UNASSIGNED_HOLDINGS
AMVHM
ASPBG
AVWKF
BDXCO
CCLIF
CITATION
CS3
D0L
DU5
EBS
EJD
FEDTE
GUFHI
HGAVV
H~9
IAO
ICD
IEA
IOF
K1G
L7B
LHSKQ
P1C
PQQKQ
QWB
RNS
TAE
TH9
TN5
UKR
UPT
WH7
XSW
YQT
ZCA
ZL0
7SC
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c286t-eceb2138d73965b9ea4ed875c6b105f2ded83f45d618b65160af0bc572255a8a3
ISSN 0004-5411
IngestDate Fri Jul 11 15:04:43 EDT 2025
Mon Jun 30 05:39:40 EDT 2025
Wed Oct 01 06:01:14 EDT 2025
Thu Apr 24 23:07:47 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 6
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c286t-eceb2138d73965b9ea4ed875c6b105f2ded83f45d618b65160af0bc572255a8a3
Notes SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 14
ObjectType-Article-1
ObjectType-Feature-2
content type line 23
PQID 1638890145
PQPubID 47580
PageCount 19
ParticipantIDs proquest_miscellaneous_1808118296
proquest_journals_1638890145
crossref_primary_10_1145_2666470
crossref_citationtrail_10_1145_2666470
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2014-11-01
PublicationDateYYYYMMDD 2014-11-01
PublicationDate_xml – month: 11
  year: 2014
  text: 2014-11-01
  day: 01
PublicationDecade 2010
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle Journal of the ACM
PublicationYear 2014
Publisher Association for Computing Machinery
Publisher_xml – name: Association for Computing Machinery
References Chang C. C. (e_1_2_1_15_1)
Katzenbeisser S. (e_1_2_1_26_1) 2000; 28
Hou Y. C. (e_1_2_1_23_1) 2004; 109
e_1_2_1_20_1
e_1_2_1_41_1
e_1_2_1_45_1
e_1_2_1_43_1
e_1_2_1_28_1
e_1_2_1_49_1
e_1_2_1_47_1
Naor M. (e_1_2_1_32_1) 1995
e_1_2_1_31_1
e_1_2_1_6_1
e_1_2_1_12_1
e_1_2_1_35_1
e_1_2_1_4_1
e_1_2_1_10_1
e_1_2_1_33_1
e_1_2_1_16_1
e_1_2_1_39_1
Blakley G. R. (e_1_2_1_8_1)
e_1_2_1_14_1
Thein C. C. (e_1_2_1_37_1) 2006; 6
e_1_2_1_18_1
Su Z. M. (e_1_2_1_36_1) 1996; 19
e_1_2_1_42_1
e_1_2_1_46_1
e_1_2_1_21_1
e_1_2_1_44_1
Ateniese G. (e_1_2_1_2_1) 1996; 1099
e_1_2_1_27_1
Massey J. L. (e_1_2_1_30_1) 1993
Hou Y. C. (e_1_2_1_24_1) 2000; 9
e_1_2_1_48_1
e_1_2_1_29_1
Hou Y. C. (e_1_2_1_22_1); 16
Ito R. (e_1_2_1_25_1) 1999; 82
Tsai C. S. (e_1_2_1_40_1)
e_1_2_1_7_1
e_1_2_1_5_1
e_1_2_1_3_1
e_1_2_1_13_1
e_1_2_1_34_1
e_1_2_1_1_1
e_1_2_1_11_1
e_1_2_1_17_1
e_1_2_1_38_1
e_1_2_1_9_1
e_1_2_1_19_1
References_xml – ident: e_1_2_1_4_1
  doi: 10.1016/S0304-3975(99)00127-9
– ident: e_1_2_1_44_1
  doi: 10.1016/j.patrec.2005.09.021
– ident: e_1_2_1_46_1
  doi: 10.1109/ISDA.2008.130
– volume: 16
  volume-title: Proceedings of the International Conference on Imaging Science, Systems and Technology (CISST'01)
  ident: e_1_2_1_22_1
– ident: e_1_2_1_33_1
  doi: 10.1145/359168.359176
– volume-title: Proceedings of the 6th Joint Swedish-Russian International Workshop on Information Theory. Citeseer, 276--279
  year: 1993
  ident: e_1_2_1_30_1
– volume: 1099
  start-page: 416
  year: 1996
  ident: e_1_2_1_2_1
  article-title: Constructions and bounds for visual cryptography
  publication-title: Autom. Lang. Program.
– ident: e_1_2_1_6_1
  doi: 10.1109/18.720550
– ident: e_1_2_1_48_1
  doi: 10.1016/j.patrec.2003.12.011
– ident: e_1_2_1_12_1
– ident: e_1_2_1_39_1
  doi: 10.1109/TCSVT.2003.819176
– ident: e_1_2_1_45_1
  doi: 10.1109/TIP.2003.819861
– ident: e_1_2_1_47_1
  doi: 10.1016/j.patcog.2004.01.002
– ident: e_1_2_1_35_1
  doi: 10.1016/j.patcog.2005.06.010
– volume: 28
  start-page: 1
  year: 2000
  ident: e_1_2_1_26_1
  article-title: Information hiding techniques for steganography and digital watermarking
  publication-title: EDP Audit, Control, and Security Newslet.
– ident: e_1_2_1_16_1
  doi: 10.1142/S0218001402001770
– ident: e_1_2_1_1_1
  doi: 10.1016/j.cpc.2005.07.002
– volume: 9
  start-page: 89
  year: 2000
  ident: e_1_2_1_24_1
  article-title: A new approach on 256 color secret image sharing technique
  publication-title: MIS Review
– ident: e_1_2_1_3_1
  doi: 10.1006/inco.1996.0076
– volume: 109
  start-page: 95
  year: 2004
  ident: e_1_2_1_23_1
  article-title: Visual cryptography techniques for color images without pixel expansion
  publication-title: J. Inf. Tech. Soc.
– volume-title: Proceedings of the IEEE International Symposium on Information Theory. IEEE
  ident: e_1_2_1_8_1
– ident: e_1_2_1_17_1
  doi: 10.1093/comjnl/bxh152
– volume-title: Proceedings of the International Conference on Communication Technology (ICCT'03)
  ident: e_1_2_1_15_1
– ident: e_1_2_1_13_1
  doi: 10.1016/S0020-0255(98)10011-7
– ident: e_1_2_1_43_1
  doi: 10.1016/j.patcog.2006.11.018
– ident: e_1_2_1_20_1
  doi: 10.1109/TSP.2003.809376
– ident: e_1_2_1_42_1
  doi: 10.1007/BF01398012
– ident: e_1_2_1_21_1
  doi: 10.1016/S0031-3203(02)00258-3
– ident: e_1_2_1_7_1
  doi: 10.1109/MARK.1979.8817296
– ident: e_1_2_1_29_1
– volume: 82
  start-page: 2172
  year: 1999
  ident: e_1_2_1_25_1
  article-title: Image size invariant visual cryptography
  publication-title: IEICE Trans. Fund. Electon. Commun. Comput. Sci. E Ser. A
– ident: e_1_2_1_9_1
  doi: 10.1023/A:1011271120274
– volume: 19
  start-page: 293
  year: 1996
  ident: e_1_2_1_36_1
  article-title: The arbitrary share of visual secrets
  publication-title: Chinese J. Comput.
– ident: e_1_2_1_27_1
  doi: 10.1017/CBO9780511525926
– volume-title: Proceedings of the Advances in Multimedia Information Processing (PCM'01)
  ident: e_1_2_1_40_1
– ident: e_1_2_1_31_1
  doi: 10.1145/358746.358762
– ident: e_1_2_1_18_1
  doi: 10.1016/0167-4048(94)90097-3
– volume-title: Cryptology: Eurocrypt'94
  year: 1995
  ident: e_1_2_1_32_1
– ident: e_1_2_1_34_1
  doi: 10.1109/TIP.2005.859378
– volume: 6
  start-page: 219
  year: 2006
  ident: e_1_2_1_37_1
  article-title: Sharing secret images by using base-transform and small-size host images
  publication-title: Int. J. Comput. Sci. Netw. Secur.
– ident: e_1_2_1_19_1
  doi: 10.1016/j.jss.2004.07.250
– ident: e_1_2_1_49_1
  doi: 10.1109/TIP.2006.875249
– ident: e_1_2_1_38_1
  doi: 10.1016/S0097-8493(02)00131-0
– ident: e_1_2_1_11_1
  doi: 10.1016/S0020-0190(00)00108-3
– ident: e_1_2_1_14_1
  doi: 10.1016/j.ins.2007.12.016
– ident: e_1_2_1_41_1
  doi: 10.1016/S0164-1212(02)00034-1
– ident: e_1_2_1_5_1
  doi: 10.5555/647595
– ident: e_1_2_1_10_1
  doi: 10.1016/S0097-8493(98)00034-X
– ident: e_1_2_1_28_1
SSID ssj0000207
Score 2.110927
Snippet Image sharing is an attractive research subject in computer image techniques and in the information security field. This article presents a novel scheme of...
SourceID proquest
crossref
SourceType Aggregation Database
Enrichment Source
Index Database
StartPage 1
SubjectTerms Computer information security
Data encryption
Information sharing
Interpolation
Pixels
Polynomials
Shadows
Studies
Thresholds
Visual
Title A New Approach to Image Sharing with High-Security Threshold Structure
URI https://www.proquest.com/docview/1638890145
https://www.proquest.com/docview/1808118296
Volume 61
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVEBS
  databaseName: EBSCOhost Mathematics Source - HOST
  customDbUrl:
  eissn: 1557-735X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000207
  issn: 0004-5411
  databaseCode: AMVHM
  dateStart: 20040301
  isFulltext: true
  titleUrlDefault: https://www.ebsco.com/products/research-databases/mathematics-source
  providerName: EBSCOhost
– providerCode: PRVEBS
  databaseName: Inspec with Full Text
  customDbUrl:
  eissn: 1557-735X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000207
  issn: 0004-5411
  databaseCode: ADMLS
  dateStart: 20040301
  isFulltext: true
  titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text
  providerName: EBSCOhost
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3Nb9MwFLdKd-HC-BSFgYyEdkGGJrGd9BhNq8q0DiFS1FtkO47oBE2ntZf9DfzRvBc7SSMqBFyiNrGsxO_n957fJyFvdRRZEHQFg2NXyHhsEqYTKdhYBbCbIiyoXkdbXMnZgl8sxXIw-LkXtbTb6vfm7mBeyf9QFe4BXTFL9h8o204KN-A30BeuQGG4_hWN0zo8Md10aVEff2AMDlZhbo2sGMnBvvg2de8yoN0tupzQH70zTUGRA_ppnXNy1hlmvGF5uVLVdSPv6o5ezoT6eXX3TVWdS8N1w64wS1h1o6d-louVul6pfZNDwH3uXQuSDjh1LKTrP4GfNa8DQJtk7oblcia456jWc1kRszgSy3027Gqye7jt89TgMKfnWBQD1AvJXeeRfi3tq0_5dHF5mWfny6z_1Mlu0HJB1QHudrq5YdiDDH31viHLPXIUgowYD8lROv86m3eSPXTp980nuSRsfJUP_kX62k1fuNcaS_aQPPCkpKnDzSMysOvH5Lhp40E9V39CpikFGNEGRnRb0RpG1MOIIoxoD0a0hRFtYfSULKbn2dmM-fYazISJ3DJrrA6DKCniaCKFnljFbQHHVyM1KN1lWMC_qOSikEGipQjkWJVjbUQMIkCoREXPyHBdre1zQiMTWxuDdluaiMOmVyBIJqWQBZoLhC5H5LRZltz42vPYAuV77vLiRe7Xb0RoO3Djyq38PuSkWdfc78XbHE8VCUYEiBF50z4GTonuL7W21Q7GYJMZOE5P5Is_T_GS3O9Qf0KGsI72FaieW_3aI-IX-7GFKQ
linkProvider EBSCOhost
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+New+Approach+to+Image+Sharing+with+High-Security+Threshold+Structure&rft.jtitle=Journal+of+the+ACM&rft.au=Wang%2C+Xiaojing&rft.au=Yuan%2C+Qizhao&rft.au=Cai%2C+Hongliang&rft.au=Fang%2C+Jiajia&rft.date=2014-11-01&rft.pub=Association+for+Computing+Machinery&rft.issn=0004-5411&rft.eissn=1557-735X&rft.volume=61&rft.issue=6&rft.spage=1&rft_id=info:doi/10.1145%2F2666470&rft.externalDBID=NO_FULL_TEXT&rft.externalDocID=3533512301
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0004-5411&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0004-5411&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0004-5411&client=summon