Synonyms
Definition
Among numerous cryptographic solutions proposed in the past few years, secret sharing schemes have been found sufficiently secure to facilitate distributed trust and shared control in various communication applications.
Introduction
Digital rights management systems are used to protect intellectual property rights of Digital media itself or secure its transmission over untrusted communication channels [1–3]. The required protection is achieved by employing either cryptography or Steganography. Steganography hides the secret message inside a cover signal producing its stego-version with an imperceivable difference from the original cover, whereas Cryptography alters the meaningless of the secret message through its encryption Necessitating the use of a decryption key to recover the original content.
Among numerous cryptographic solutions proposed in the past few years, secret sharing schemes have been found sufficiently secure to...
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
M. Barni and F. Bartolini, “Data Hiding for Fighting Piracy,” IEEE Signal Processing Magazine, Vol. 21, No. 2, March 2004, pp. 28–39.
R. Lukac and K.-N. Plataniotis, “Bit-Level Based Secret Sharing for Image Encryption,” Pattern Recognition, Vol. 38, No. 5, May 2005, pp. 767–772.
E.-T. Lin, A.M. Eskicioglu, R.-L. Lagendijk, and E.-D. Delp, “Advances in Digital Video Content Protection,” Proceedings of the IEEE, Vol. 93, No. 1, January 2005, pp. 171–183.
A.-M. Eskicioglu, E.-J. Delp, and M.-R. Eskicioglu, “New Channels for Carrying Copyright and Usage Rights Data in Digital Multimedia Distribution,” Proceedings of the International Conference on Information Technology: Research and Education (ITRE'03), August 2003, pp. 94–98.
E.-D. Karnin, J.-W. Greene, and M.-E. Hellman, “On Secret Sharing Systems,” IEEE Transactions on Information Theory, Vol. 29, No. 1, January 1983, pp. 35–41.
A. Biemel and B. Chor, “Secret Sharing with Public Reconstruction,” IEEE Transactions on Information Theory, Vol. 44, No. 5, September 1998, pp. 1887–1896.
R. Lukac and K.-N. Plataniotis, “Colour Image Secret Sharing,” IEE Electronics Letters, Vol. 40, No. 9, April 2004, pp. 529–530.
R. Lukac and K.-N. Plataniotis, “A New Encryption Scheme for Color Images,” Computing and Informatics, submitted.
C.-S. Tsai, C.-C. Chang, and T.-S. Chen, “Sharing Multiple Secrets in Digital Images,” Journal of Systems and Software, Vol.64, No.2, 2002, pp. 163–170.
C.-C. Chang and J.-C. Chuang, “An Image Intellectual Property Protection Scheme for Gray-Level Images Using Visual Secret Sharing Strategy,” Pattern Recognition Letters, Vol. 23, No. 8, June 2002, pp. 931–941.
P.-A. Eisen and D.-R. Stinson, “Threshold Visual Cryptography Schemes with Specified Levels of Reconstructed Pixels,” Design, Codes and Cryptography, Vol. 25, No.1, January 2002, pp. 15–61.
E.-R. Verheul and H.-C.-A. Van Tilborg, “Constructions and Properties of k out of n Visual Secret Sharing Schemes,” Designs, Codes and Cryptography, Vol. 11, No. 2, May 1997, pp. 179–196.
G. Ateniese, C. Blundo, A. de Santis, and D.-G. Stinson, “Visual Cryptography for General Access Structures,” Information and Computation, Vol. 129, No. 2, September 1996, pp. 86–106.
R. Lukac and K.-N. Plataniotis, “A Cost-Effective Private-Key Cryptosystem for Color Image Encryption,” Lecture Notes in Computer Science, Vol. 3514, May 2005, pp. 679–686.
M. Naor and A. Shamir, “Visual Cryptography,” Proceedings of EUROCRYPT'94, Lecture Notes in Computer Science, Vol. 950, 1994, pp. 1–12.
C.-N. Yang, “New Visual Secret Sharing Schemes Using Probabilistic Method,” Pattern Recognition Letters, Vol. 25, No. 4, March 2004, pp. 481–494.
C.-N. Yang and T.-S. Chen, “Aspect Ratio Invariant Visual Secret Sharing Schemes with Minimum Pixel Expansion,” Pattern Recognition Letters, Vol. 26, No. 2, January 2005, pp.193–206.
C.-N. Yang and T.-S. Chen, “Size-Adjustable Visual Secret Sharing Schemes,” IEICE Transactions on Fundamentals, Vol. E88-A, No. 9, September 2005, pp. 2471–2474.
H. Yamamoto, Y. Hayasaki, and N. Nishida, “Securing Information Display by Use of Visual Cryptography,” Optics Letters, Vol. 28, No. 17, September 2003, pp. 1564–1566.
R. Lukac and K.-N. Plataniotis, “Image Representation Based Secret Sharing,” Communications of the CCISA (Chinese Cryptology Information Security Association), Special Issue on Visual Secret Sharing, Vol. 6, April 2005.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag
About this entry
Cite this entry
Lukac, R., Plataniotis, K.N., Yang, CN. (2008). Image Secret Sharing. In: Furht, B. (eds) Encyclopedia of Multimedia. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-78414-4_82
Download citation
DOI: https://doi.org/10.1007/978-0-387-78414-4_82
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-74724-8
Online ISBN: 978-0-387-78414-4
eBook Packages: Computer ScienceReference Module Computer Science and Engineering