Araştırma Makalesi
BibTex RIS Kaynak Göster
Yıl 2019, Cilt: 6 Sayı: 3, 51 - 60, 30.09.2019

Öz

Kaynakça

  • [1] Blakley, G. R. "Safeguarding cryptographic keys", Proceedings of the national computer conference 48, 313–317 (1979).
  • [2] Shamir, A. "How to share a secret", Commun. ACM, 22, 612–613 (1979).
  • [3] Simmons, G. J., "How to (really) share a secret", Conference on the Theory and Application of Cryptography, 390–448 (Springer, 1988).
  • [4] Tassa, T., "Hierarchical threshold secret sharing", J. Cryptol. 20, 237–264 (2007).
  • [5] Naor, M. & Shamir, A., "Visual cryptography", Workshop on the Theory and Application of of Cryptographic Techniques, 1–12 (Springer, 1994).
  • [6] Thien, C.-C. & Lin, J.-C., "Secret image sharing", Comput. Graph. 26, 765–770 (2002).
  • [7] Wang, R.-Z. & Su, C.-H., "Secret image sharing with smaller shadow images", Pattern Recognit. Lett. 27, 551–555 (2006).
  • [8] Tso, H.-K., "Sharing secret images using Blakley’s concept", Opt. Eng. 47, 77001 (2008).
  • [9] Chen, C.-C., Fu, W.-Y. & Chen, C.-C. "A Geometry-Based Secret Image Sharing Approach", J. Inf. Sci. Eng., 24, 1567–1577 (2008).
  • [10] Yang, C.-N., Wu, C.-C. & Chou, C.-W. A Comment on" Sharing Secret Images Using Blakley’s Concept", Intelligent Information Hiding and Multimedia Signal Processing, 2013 Ninth International Conference, 383–386 (IEEE, 2013).
  • [11] Ulutas, M., Nabiyev, V. V & Ulutas, G., "Improvements in geometry-based secret image sharing approach with steganography", Math. Probl. Eng. 2009, (2009).
  • [12] Guo, C., Chang, C.-C. & Qin, C. "A hierarchical threshold secret image sharing", Pattern Recognit. Lett. 33, 83–91 (2012).
  • [13] Pakniat, N., Noroozi, M. & Eslami, Z. "Secret image sharing scheme with hierarchical threshold access structure", J. Vis. Commun. Image Represent. 25, 1093–1101 (2014).
  • [14] Bhattacharjee, T., Maity, S. P. & Islam, S. R. "Hierarchical secret image sharing scheme in compressed sensing", Signal Process. Image Commun. 61, 21–32 (2018).
  • [15] Li, P., Yang, C.-N. & Zhou, Z. "Essential secret image sharing scheme with the same size of shadows", Digit. Signal Process. 50, 51–60 (2016).
  • [16] Liu, Y. & Yang, C. "Scalable secret image sharing scheme with essential shadows", Signal Process. Image Commun. 58, 49–55 (2017).
  • [17] P, M. F. & P, A. J. R. "Hierarchical threshold secret sharing scheme for color images", Multimed. Tools Appl. 1–15 (2016). doi:10.1007/s11042-016-4074-y

Geometry Based Conjunctive Hierarchical Threshold Secret Image Sharing Scheme

Yıl 2019, Cilt: 6 Sayı: 3, 51 - 60, 30.09.2019

Öz

In hierarchical secret sharing scheme (HSSS), the secret is shared among participants with different privileges that are distributed into distinct levels. Although HSSS has been proposed by several researchers, none of them have been used geometry characteristics to define conjunctive hierarchical secret image sharing (HSIS) scheme. Moreover, small shadow images have important role in transmission over the network and also in storage demand. The main objective of this paper is to propose conjunctive HSIS scheme based on generalized Blakley’s projective geometry scheme with small size of shadow images. 

Kaynakça

  • [1] Blakley, G. R. "Safeguarding cryptographic keys", Proceedings of the national computer conference 48, 313–317 (1979).
  • [2] Shamir, A. "How to share a secret", Commun. ACM, 22, 612–613 (1979).
  • [3] Simmons, G. J., "How to (really) share a secret", Conference on the Theory and Application of Cryptography, 390–448 (Springer, 1988).
  • [4] Tassa, T., "Hierarchical threshold secret sharing", J. Cryptol. 20, 237–264 (2007).
  • [5] Naor, M. & Shamir, A., "Visual cryptography", Workshop on the Theory and Application of of Cryptographic Techniques, 1–12 (Springer, 1994).
  • [6] Thien, C.-C. & Lin, J.-C., "Secret image sharing", Comput. Graph. 26, 765–770 (2002).
  • [7] Wang, R.-Z. & Su, C.-H., "Secret image sharing with smaller shadow images", Pattern Recognit. Lett. 27, 551–555 (2006).
  • [8] Tso, H.-K., "Sharing secret images using Blakley’s concept", Opt. Eng. 47, 77001 (2008).
  • [9] Chen, C.-C., Fu, W.-Y. & Chen, C.-C. "A Geometry-Based Secret Image Sharing Approach", J. Inf. Sci. Eng., 24, 1567–1577 (2008).
  • [10] Yang, C.-N., Wu, C.-C. & Chou, C.-W. A Comment on" Sharing Secret Images Using Blakley’s Concept", Intelligent Information Hiding and Multimedia Signal Processing, 2013 Ninth International Conference, 383–386 (IEEE, 2013).
  • [11] Ulutas, M., Nabiyev, V. V & Ulutas, G., "Improvements in geometry-based secret image sharing approach with steganography", Math. Probl. Eng. 2009, (2009).
  • [12] Guo, C., Chang, C.-C. & Qin, C. "A hierarchical threshold secret image sharing", Pattern Recognit. Lett. 33, 83–91 (2012).
  • [13] Pakniat, N., Noroozi, M. & Eslami, Z. "Secret image sharing scheme with hierarchical threshold access structure", J. Vis. Commun. Image Represent. 25, 1093–1101 (2014).
  • [14] Bhattacharjee, T., Maity, S. P. & Islam, S. R. "Hierarchical secret image sharing scheme in compressed sensing", Signal Process. Image Commun. 61, 21–32 (2018).
  • [15] Li, P., Yang, C.-N. & Zhou, Z. "Essential secret image sharing scheme with the same size of shadows", Digit. Signal Process. 50, 51–60 (2016).
  • [16] Liu, Y. & Yang, C. "Scalable secret image sharing scheme with essential shadows", Signal Process. Image Commun. 58, 49–55 (2017).
  • [17] P, M. F. & P, A. J. R. "Hierarchical threshold secret sharing scheme for color images", Multimed. Tools Appl. 1–15 (2016). doi:10.1007/s11042-016-4074-y
Toplam 17 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Bölüm Bilgisayar Mühendisliği
Yazarlar

Vasif V. Nabiyev

Katira Soleymanzadeh

Yayımlanma Tarihi 30 Eylül 2019
Gönderilme Tarihi 12 Nisan 2018
Yayımlandığı Sayı Yıl 2019 Cilt: 6 Sayı: 3

Kaynak Göster

APA V. Nabiyev, V., & Soleymanzadeh, K. (2019). Geometry Based Conjunctive Hierarchical Threshold Secret Image Sharing Scheme. Gazi University Journal of Science Part A: Engineering and Innovation, 6(3), 51-60.