A pervasive secret sharing scheme for embedded visual communication system

Chul Ung Lee, Hyoung Joong Kim, Jong Hyuk Park, Sang Soo Yeo, Jaesoo Yang

Research output: Contribution to journalArticlepeer-review


A simple secret sharing scheme for secure visual communications is presented in this paper. Secret sharing schemes allow a group of participants at different locations to share a secret (i.e., an image) among them by splitting it into n pieces (“shazes” or “shadows”. In case of the (k, n) secret shazing scheme only a group of k qualified participants among n (where k≤n) can reconstruct the secret. This paper presents an (n, n) secret sharing scheme. This scheme randomizes one shaze after another by executing XOR operations with random seeds derived from an initial seed. This scheme can also be used as an image encryption scheme. This scheme is resistant to collusion attacks.

Original languageEnglish
Pages (from-to)433-447
Number of pages15
JournalIntelligent Automation and Soft Computing
Issue number3
Publication statusPublished - 2010 Jan


  • Embedded System
  • Information Security
  • Pervasive Computing
  • Secret Sharing

ASJC Scopus subject areas

  • Software
  • Theoretical Computer Science
  • Computational Theory and Mathematics
  • Artificial Intelligence


Dive into the research topics of 'A pervasive secret sharing scheme for embedded visual communication system'. Together they form a unique fingerprint.

Cite this