Security Analysis of Secret Image Sharing View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2017-09-16

AUTHORS

Xuehu Yan , Yuliang Lu , Lintao Liu , Song Wan , Wanmeng Ding , Hanlin Liu

ABSTRACT

Differently from pure data encryption, secret image sharing (SIS) mainly focuses on image protection through generating a secret image into n shadow images (shares) distributed to n associated participants. The secret image can be reconstructed by collecting sufficient shadow images. In recent years, many SIS schemes are proposed, among which Shamir’s polynomial-based SIS scheme and visual secret sharing (VSS) also called visual cryptography scheme (VCS) are the primary branches. However, as the basic research issues, the security analysis and security level classification of SIS are rarely discussed. In this paper, based on the study of image feature and typical SIS schemes, four security levels are classified as well as the security of typical SIS schemes are analyzed. Furthermore, experiments are conducted to evaluate the efficiency of our analysis by employing illustrations and evaluation metrics. More... »

PAGES

305-316

Book

TITLE

Data Science

ISBN

978-981-10-6384-8
978-981-10-6385-5

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-981-10-6385-5_26

DOI

http://dx.doi.org/10.1007/978-981-10-6385-5_26

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1091806392


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Hefei Electronic Engineering Institute, 230037, Hefei, China", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Hefei Electronic Engineering Institute, 230037, Hefei, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Yan", 
        "givenName": "Xuehu", 
        "id": "sg:person.010467364517.31", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010467364517.31"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Hefei Electronic Engineering Institute, 230037, Hefei, China", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Hefei Electronic Engineering Institute, 230037, Hefei, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Lu", 
        "givenName": "Yuliang", 
        "id": "sg:person.015112370271.93", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015112370271.93"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Hefei Electronic Engineering Institute, 230037, Hefei, China", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Hefei Electronic Engineering Institute, 230037, Hefei, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Liu", 
        "givenName": "Lintao", 
        "id": "sg:person.013517427271.32", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013517427271.32"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Hefei Electronic Engineering Institute, 230037, Hefei, China", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Hefei Electronic Engineering Institute, 230037, Hefei, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Wan", 
        "givenName": "Song", 
        "id": "sg:person.012077574322.79", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012077574322.79"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Hefei Electronic Engineering Institute, 230037, Hefei, China", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Hefei Electronic Engineering Institute, 230037, Hefei, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Ding", 
        "givenName": "Wanmeng", 
        "id": "sg:person.010577640471.37", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010577640471.37"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Hefei Electronic Engineering Institute, 230037, Hefei, China", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Hefei Electronic Engineering Institute, 230037, Hefei, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Liu", 
        "givenName": "Hanlin", 
        "id": "sg:person.011535473267.30", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011535473267.30"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2017-09-16", 
    "datePublishedReg": "2017-09-16", 
    "description": "Differently from pure data encryption, secret image sharing (SIS) mainly focuses on image protection through generating a secret image into n shadow images (shares) distributed to n associated participants. The secret image can be reconstructed by collecting sufficient shadow images. In recent years, many SIS schemes are proposed, among which Shamir\u2019s polynomial-based SIS scheme and visual secret sharing (VSS) also called visual cryptography scheme (VCS) are the primary branches. However, as the basic research issues, the security analysis and security level classification of SIS are rarely discussed. In this paper, based on the study of image feature and typical SIS schemes, four security levels are classified as well as the security of typical SIS schemes are analyzed. Furthermore, experiments are conducted to evaluate the efficiency of our analysis by employing illustrations and evaluation metrics.", 
    "editor": [
      {
        "familyName": "Zou", 
        "givenName": "Beiji", 
        "type": "Person"
      }, 
      {
        "familyName": "Li", 
        "givenName": "Min", 
        "type": "Person"
      }, 
      {
        "familyName": "Wang", 
        "givenName": "Hongzhi", 
        "type": "Person"
      }, 
      {
        "familyName": "Song", 
        "givenName": "Xianhua", 
        "type": "Person"
      }, 
      {
        "familyName": "Xie", 
        "givenName": "Wei", 
        "type": "Person"
      }, 
      {
        "familyName": "Lu", 
        "givenName": "Zeguang", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-981-10-6385-5_26", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-981-10-6384-8", 
        "978-981-10-6385-5"
      ], 
      "name": "Data Science", 
      "type": "Book"
    }, 
    "keywords": [
      "secret image sharing", 
      "visual secret sharing", 
      "visual cryptography scheme", 
      "SIS schemes", 
      "secret image", 
      "image sharing", 
      "security analysis", 
      "shadow images", 
      "security level classification", 
      "data encryption", 
      "image protection", 
      "cryptography scheme", 
      "basic research issues", 
      "secret sharing", 
      "security level", 
      "image features", 
      "evaluation metrics", 
      "research issues", 
      "SI scheme", 
      "level classification", 
      "sharing", 
      "images", 
      "scheme", 
      "encryption", 
      "recent years", 
      "security", 
      "metrics", 
      "classification", 
      "features", 
      "issues", 
      "efficiency", 
      "experiments", 
      "analysis", 
      "illustration", 
      "protection", 
      "branches", 
      "participants", 
      "levels", 
      "years", 
      "study", 
      "primary branches", 
      "paper"
    ], 
    "name": "Security Analysis of Secret Image Sharing", 
    "pagination": "305-316", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1091806392"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-981-10-6385-5_26"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-981-10-6385-5_26", 
      "https://app.dimensions.ai/details/publication/pub.1091806392"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-12-01T06:47", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20221201/entities/gbq_results/chapter/chapter_16.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-981-10-6385-5_26"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-981-10-6385-5_26'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-981-10-6385-5_26'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-981-10-6385-5_26'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-981-10-6385-5_26'


 

This table displays all metadata directly associated to this object as RDF triples.

161 TRIPLES      22 PREDICATES      66 URIs      59 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-981-10-6385-5_26 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N06421781103c4856a59bcf86b1a21279
4 schema:datePublished 2017-09-16
5 schema:datePublishedReg 2017-09-16
6 schema:description Differently from pure data encryption, secret image sharing (SIS) mainly focuses on image protection through generating a secret image into n shadow images (shares) distributed to n associated participants. The secret image can be reconstructed by collecting sufficient shadow images. In recent years, many SIS schemes are proposed, among which Shamir’s polynomial-based SIS scheme and visual secret sharing (VSS) also called visual cryptography scheme (VCS) are the primary branches. However, as the basic research issues, the security analysis and security level classification of SIS are rarely discussed. In this paper, based on the study of image feature and typical SIS schemes, four security levels are classified as well as the security of typical SIS schemes are analyzed. Furthermore, experiments are conducted to evaluate the efficiency of our analysis by employing illustrations and evaluation metrics.
7 schema:editor N35053e4acd28471a8ca58e15751ddf01
8 schema:genre chapter
9 schema:isAccessibleForFree false
10 schema:isPartOf Ne01a0b53c0b0449ab6996531b2745e3e
11 schema:keywords SI scheme
12 SIS schemes
13 analysis
14 basic research issues
15 branches
16 classification
17 cryptography scheme
18 data encryption
19 efficiency
20 encryption
21 evaluation metrics
22 experiments
23 features
24 illustration
25 image features
26 image protection
27 image sharing
28 images
29 issues
30 level classification
31 levels
32 metrics
33 paper
34 participants
35 primary branches
36 protection
37 recent years
38 research issues
39 scheme
40 secret image
41 secret image sharing
42 secret sharing
43 security
44 security analysis
45 security level
46 security level classification
47 shadow images
48 sharing
49 study
50 visual cryptography scheme
51 visual secret sharing
52 years
53 schema:name Security Analysis of Secret Image Sharing
54 schema:pagination 305-316
55 schema:productId N0ac1ef30f5ce490ba797b761c05b1466
56 N251f217b21ed4f1c87cd46b5425e1caf
57 schema:publisher Ndbfed5bca28645dfaa069300aba23e61
58 schema:sameAs https://app.dimensions.ai/details/publication/pub.1091806392
59 https://doi.org/10.1007/978-981-10-6385-5_26
60 schema:sdDatePublished 2022-12-01T06:47
61 schema:sdLicense https://scigraph.springernature.com/explorer/license/
62 schema:sdPublisher N470a7af769d14605b2e6de4f88e07e27
63 schema:url https://doi.org/10.1007/978-981-10-6385-5_26
64 sgo:license sg:explorer/license/
65 sgo:sdDataset chapters
66 rdf:type schema:Chapter
67 N06421781103c4856a59bcf86b1a21279 rdf:first sg:person.010467364517.31
68 rdf:rest N79fdd59bb9ac4ae4b437c301be773179
69 N07fb3d4ab4d74a15a426fecc06f2712d schema:familyName Wang
70 schema:givenName Hongzhi
71 rdf:type schema:Person
72 N0ac1ef30f5ce490ba797b761c05b1466 schema:name doi
73 schema:value 10.1007/978-981-10-6385-5_26
74 rdf:type schema:PropertyValue
75 N0d509b6898024e09955ef5d700ff8c3c schema:familyName Li
76 schema:givenName Min
77 rdf:type schema:Person
78 N16758969320949ccb67c7904166ac3f0 schema:familyName Lu
79 schema:givenName Zeguang
80 rdf:type schema:Person
81 N1981f46666884eb2b4e16564ba5e601e rdf:first sg:person.010577640471.37
82 rdf:rest Nff17dd5375f94140ab9480c202770cdf
83 N1aed2a5966f2471cb027fc37e3db5ac9 schema:familyName Zou
84 schema:givenName Beiji
85 rdf:type schema:Person
86 N1c6a1a6f9ff6488991d811ed0b6a572d rdf:first N0d509b6898024e09955ef5d700ff8c3c
87 rdf:rest N2d69ff0d298c49a7933407e7ae8db5dd
88 N251f217b21ed4f1c87cd46b5425e1caf schema:name dimensions_id
89 schema:value pub.1091806392
90 rdf:type schema:PropertyValue
91 N2d69ff0d298c49a7933407e7ae8db5dd rdf:first N07fb3d4ab4d74a15a426fecc06f2712d
92 rdf:rest Nded3152a3ca849ec9874efec12d5933c
93 N35053e4acd28471a8ca58e15751ddf01 rdf:first N1aed2a5966f2471cb027fc37e3db5ac9
94 rdf:rest N1c6a1a6f9ff6488991d811ed0b6a572d
95 N3d527a45dcef408da8397327c74bc353 schema:familyName Song
96 schema:givenName Xianhua
97 rdf:type schema:Person
98 N415e05eb75094ae2ab9be844b4c27cfe rdf:first N9cd6314fbd93474e8e49aff2a9fdda42
99 rdf:rest Nf3ca973bf24e4836b5a5c430b4512a50
100 N43c04ecfff9047d6a89978d3d9690529 rdf:first sg:person.013517427271.32
101 rdf:rest Nc29558fa5386459396b3a56a363908c3
102 N470a7af769d14605b2e6de4f88e07e27 schema:name Springer Nature - SN SciGraph project
103 rdf:type schema:Organization
104 N79fdd59bb9ac4ae4b437c301be773179 rdf:first sg:person.015112370271.93
105 rdf:rest N43c04ecfff9047d6a89978d3d9690529
106 N9cd6314fbd93474e8e49aff2a9fdda42 schema:familyName Xie
107 schema:givenName Wei
108 rdf:type schema:Person
109 Nc29558fa5386459396b3a56a363908c3 rdf:first sg:person.012077574322.79
110 rdf:rest N1981f46666884eb2b4e16564ba5e601e
111 Ndbfed5bca28645dfaa069300aba23e61 schema:name Springer Nature
112 rdf:type schema:Organisation
113 Nded3152a3ca849ec9874efec12d5933c rdf:first N3d527a45dcef408da8397327c74bc353
114 rdf:rest N415e05eb75094ae2ab9be844b4c27cfe
115 Ne01a0b53c0b0449ab6996531b2745e3e schema:isbn 978-981-10-6384-8
116 978-981-10-6385-5
117 schema:name Data Science
118 rdf:type schema:Book
119 Nf3ca973bf24e4836b5a5c430b4512a50 rdf:first N16758969320949ccb67c7904166ac3f0
120 rdf:rest rdf:nil
121 Nff17dd5375f94140ab9480c202770cdf rdf:first sg:person.011535473267.30
122 rdf:rest rdf:nil
123 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
124 schema:name Information and Computing Sciences
125 rdf:type schema:DefinedTerm
126 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
127 schema:name Data Format
128 rdf:type schema:DefinedTerm
129 sg:person.010467364517.31 schema:affiliation grid-institutes:None
130 schema:familyName Yan
131 schema:givenName Xuehu
132 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010467364517.31
133 rdf:type schema:Person
134 sg:person.010577640471.37 schema:affiliation grid-institutes:None
135 schema:familyName Ding
136 schema:givenName Wanmeng
137 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010577640471.37
138 rdf:type schema:Person
139 sg:person.011535473267.30 schema:affiliation grid-institutes:None
140 schema:familyName Liu
141 schema:givenName Hanlin
142 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011535473267.30
143 rdf:type schema:Person
144 sg:person.012077574322.79 schema:affiliation grid-institutes:None
145 schema:familyName Wan
146 schema:givenName Song
147 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012077574322.79
148 rdf:type schema:Person
149 sg:person.013517427271.32 schema:affiliation grid-institutes:None
150 schema:familyName Liu
151 schema:givenName Lintao
152 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013517427271.32
153 rdf:type schema:Person
154 sg:person.015112370271.93 schema:affiliation grid-institutes:None
155 schema:familyName Lu
156 schema:givenName Yuliang
157 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015112370271.93
158 rdf:type schema:Person
159 grid-institutes:None schema:alternateName Hefei Electronic Engineering Institute, 230037, Hefei, China
160 schema:name Hefei Electronic Engineering Institute, 230037, Hefei, China
161 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...