期刊
COMPUTER STANDARDS & INTERFACES
卷 31, 期 1, 页码 252-257出版社
ELSEVIER
DOI: 10.1016/j.csi.2007.10.012
关键词
Cryptography; Image processing; Secret sharing; Verification; Security channel
A verifiable image secret sharing scheme, which is based on the Thien-Lin scheme and the intractability of the discrete logarithm, is proposed in this paper. The new scheme can identify the cheaters no matter if she/he is the original secret image holder or the participant; because each participant chooses her/his own secret shadow by her/himself, the new system doesn't need a security channel; Due to the same fact, the secret shadow of each participant can be reused. In addition, the size of each shadow image, same as the Thien-Lin scheme, is smaller than that of the original secret image. (C) 2007 Elsevier B.V. All rights reserved.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据