We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

User-Friendly Sharing System using Polynomials with Different Primes in Two Images

by Hung P. Vo
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 86 - Number 10
Year of Publication: 2014
Authors: Hung P. Vo
10.5120/15025-3315

Hung P. Vo . User-Friendly Sharing System using Polynomials with Different Primes in Two Images. International Journal of Computer Applications. 86, 10 ( January 2014), 40-45. DOI=10.5120/15025-3315

@article{ 10.5120/15025-3315,
author = { Hung P. Vo },
title = { User-Friendly Sharing System using Polynomials with Different Primes in Two Images },
journal = { International Journal of Computer Applications },
issue_date = { January 2014 },
volume = { 86 },
number = { 10 },
month = { January },
year = { 2014 },
issn = { 0975-8887 },
pages = { 40-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume86/number10/15025-3315/ },
doi = { 10.5120/15025-3315 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:03:54.059374+05:30
%A Hung P. Vo
%T User-Friendly Sharing System using Polynomials with Different Primes in Two Images
%J International Journal of Computer Applications
%@ 0975-8887
%V 86
%N 10
%P 40-45
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Yang et al. recently developed a user-friendly image-sharing scheme that shares images using many polynomials with different primes. Yang et al. modified the least significant bit (LSB) of original pixels to identify the prime number for sharing. However, the reconstructed image retains some noise. The scheme proposed in this work uses polynomials with different primes to generate pixel shadows without adjusting the LSBs of original pixels, such that the recovery process can reconstruct a high-quality original image using the Lagrange interpolation function.

References
  1. A. Shamir, "How to share a secret," Communications of the ACM, Vol. 22, no. 11, pp. 612–613, 1979.
  2. G. R. Blakley, "Safeguarding cryptographic keys," Proceedings of AFIPS 1979 National Computer Conference, Vol. 48, pp. 313–317, 1979.
  3. C. C. Thien and J. C. Lin, " Secret image sharing," Computers and Graphics, Vol. 26, pp. 765–770, 2002.
  4. M. Naor and A. Shamir, "Visual cryptography," Advances in Cryptography: Eurocrypt'94, pp. 1–12, 1995.
  5. C. C. Thien and J. C. Lin, "An image-sharing method with user-friendly shadow images," IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, pp. 1161–1169, 2003.
  6. C. N. Yang, K. H. Yu, and R. Lukac, "User-friendly image sharing using polynomials with different primes," IEEE Transactions on Circuits and Systems for Video Technology, Vol. 17, pp. 40–47, 2007.
  7. C. C. Chang, C. C. Lin, C. H. Lin, and Y. H. Chen, " A novel secret image sharing scheme in color images using small shadow images," Information Sciences, Vol. 178, pp. 2433–2447, 2008.
  8. C. C. Chang, Y. P. Hsieh, and C. H. Lin, "Sharing secrets in stego images with authentication," Pattern Recognition, Vol. 41, pp. 3130–3137, 2008.
  9. P. Y. Lin and C. S. Chan, "Invertible secret image sharing with steganography," Pattern Recognition Letters, Vol. 31, Vol. 31, pp. 1887-1893, 2010.
  10. R. Z. Wang, Y. F. Chien, and Y. Y. Lin, " Scalable user-friendly image sharing," Journal of Visual Communication and Image Representation, Vol. 21, pp. 751-761, 2010.
  11. Z. Ni, Y. Q. Shi, N. Ansari, W. Su, Q. Sun and X. Lin, "Robust lossless image data hiding designed for semi-fragile image authentication," IEEE Transactions on Circuits and Systems for Video Technology, Vol. 18, pp. 497–509, 2008.
  12. J. Tian, "Reversible data embedding using a difference expansion," IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, pp. 890–896, 2003.
Index Terms

Computer Science
Information Sciences

Keywords

Image sharing secret sharing secret image sharing user-friendly shadow image