Abstract

Shadow images generated from Shamir’s polynomial-based secret image sharing (SSIS) may leak the original secret image information, which causes a significant risk. The occurrence of this risk is closely related to the basis of secret image sharing, Shamir’s polynomial. Shamir’s polynomial plays an essential role in secret sharing, but there are relatively few studies on the power and order number of Shamir’s polynomial. In order to improve the security and effectiveness of SSIS, this paper mainly studies the utility of two parameters in Shamir’s polynomial, order number and power. Through the research of this kind of utility, the choice of order number and power can be given under different security requirements. In this process, an effective shadow image evaluation algorithm is proposed, which can measure the security of shadow images generated by SSIS. The user can understand the influence rule of the order number and power in SSIS, so that the user can choose the appropriate order number and power according to different security needs.

Highlights

  • IntroductionWith the development and application of computer network and multimedia technology, the production, transmission, and storage of digital images have increased exponentially

  • With the development and application of computer network and multimedia technology, the production, transmission, and storage of digital images have increased exponentially.e increasing problem of information leakage and the improvement of people’s awareness of network information security have led to more and more individuals and organizations beginning to pay attention to and study the security issues in image transmission and storage

  • In order to evaluate the security of shadows more objectively, this paper proposes a new shadow security evaluation algorithm. e degree to which the shadows leak the secret of the original image can be objectively measured by the parameters obtained by the evaluation algorithm, avoiding the subjective error of the human visual system (HVS)

Read more

Summary

Introduction

With the development and application of computer network and multimedia technology, the production, transmission, and storage of digital images have increased exponentially. Digital images need to be protected during transmission and storage [1]. Image hiding is to hide the secret existence in other carriers or modules through hiding algorithms Both of these secret image protection technologies have a common feature: transmission through a single channel. Some shadows generated by SSIS may leak the original secret image information, which has a significant impact and Security and Communication Networks challenge on the security of SSIS. Is paper mainly uses theoretical analysis and experimental validation to study the impact of order number and power on the security of SSIS. E degree to which the shadows leak the secret of the original image can be objectively measured by the parameters obtained by the evaluation algorithm, avoiding the subjective error of the human visual system (HVS) In order to evaluate the security of shadows more objectively, this paper proposes a new shadow security evaluation algorithm. e degree to which the shadows leak the secret of the original image can be objectively measured by the parameters obtained by the evaluation algorithm, avoiding the subjective error of the human visual system (HVS)

Preliminary
Motivation
The Proposed Scheme
Research and Suggestions on the Selection of Order Number and Power
Experiments
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.