A pervasive secret sharing scheme for embedded visual communication system

Chul Ung Lee, Hyong Joong Kim, Jong Hyuk Park, Sang Soo Yeo, Jaesoo Yang

Research output: Contribution to journalArticle

Abstract

A simple secret sharing scheme for secure visual communications is pre-sented in this paper. Secret sharing schemes allow a group of participants at different lo-cations to share a secret (i.e., an image) among them by splitting it into n pieces ("shares" or "shadows"). In case of the (k, n) secret sharing scheme only a group of k qualified par-ticipants among n (where k = n) can reconstruct the secret. This paper presents an (n, n) secret sharing scheme. This scheme randomizes one share after another by executing XOR operations with random seeds derived from an initial seed. This scheme can also be used as an image encryption scheme. This scheme is resistant to collusion attacks.

Original languageEnglish
Pages (from-to)433-447
Number of pages15
JournalIntelligent Automation and Soft Computing
Volume16
Issue number3
Publication statusPublished - 2010 Nov 1

    Fingerprint

Keywords

  • Embedded System
  • Information Security
  • Pervasive Computing
  • Secret Shar-ing

ASJC Scopus subject areas

  • Artificial Intelligence
  • Software
  • Theoretical Computer Science
  • Computational Theory and Mathematics

Cite this