IDEAS home Printed from https://ideas.repec.org/a/plo/pone00/0168674.html
   My bibliography  Save this article

A Secure and Efficient Scalable Secret Image Sharing Scheme with Flexible Shadow Sizes

Author

Listed:
  • Dong Xie
  • Lixiang Li
  • Haipeng Peng
  • Yixian Yang

Abstract

In a general (k, n) scalable secret image sharing (SSIS) scheme, the secret image is shared by n participants and any k or more than k participants have the ability to reconstruct it. The scalability means that the amount of information in the reconstructed image scales in proportion to the number of the participants. In most existing SSIS schemes, the size of each image shadow is relatively large and the dealer does not has a flexible control strategy to adjust it to meet the demand of differen applications. Besides, almost all existing SSIS schemes are not applicable under noise circumstances. To address these deficiencies, in this paper we present a novel SSIS scheme based on a brand-new technique, called compressed sensing, which has been widely used in many fields such as image processing, wireless communication and medical imaging. Our scheme has the property of flexibility, which means that the dealer can achieve a compromise between the size of each shadow and the quality of the reconstructed image. In addition, our scheme has many other advantages, including smooth scalability, noise-resilient capability, and high security. The experimental results and the comparison with similar works demonstrate the feasibility and superiority of our scheme.

Suggested Citation

  • Dong Xie & Lixiang Li & Haipeng Peng & Yixian Yang, 2017. "A Secure and Efficient Scalable Secret Image Sharing Scheme with Flexible Shadow Sizes," PLOS ONE, Public Library of Science, vol. 12(1), pages 1-17, January.
  • Handle: RePEc:plo:pone00:0168674
    DOI: 10.1371/journal.pone.0168674
    as

    Download full text from publisher

    File URL: https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0168674
    Download Restriction: no

    File URL: https://journals.plos.org/plosone/article/file?id=10.1371/journal.pone.0168674&type=printable
    Download Restriction: no

    File URL: https://libkey.io/10.1371/journal.pone.0168674?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Peng Li & Liping Yin & Jianfeng Ma, 2020. "Visual Cryptography Scheme with Essential Participants," Mathematics, MDPI, vol. 8(5), pages 1-19, May.
    2. Yue Jiang & Xuehu Yan & Jianqing Qi & Yuliang Lu & Xuan Zhou, 2020. "Secret Image Sharing with Dealer-Participatory and Non-Dealer-Participatory Mutual Shadow Authentication Capabilities," Mathematics, MDPI, vol. 8(2), pages 1-20, February.
    3. Qindong Sun & Han Cao & Shancang Li & Houbing Song & Yanxiao Liu, 2022. "Changing the Threshold in a Bivariate Polynomial Based Secret Image Sharing Scheme," Mathematics, MDPI, vol. 10(5), pages 1-11, February.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:plo:pone00:0168674. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: plosone (email available below). General contact details of provider: https://journals.plos.org/plosone/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.