80 likes | 144 Views
Image Sharing By Chinese Remainder Theorem. Group S: S1, S2, S3 Institute of Information Systems & Applications National Tsing Hua University Hsinchu 30013, Taiwan E-mail: 104062613@m104.nthu.edu.tw. Abstract ( 摘要 ).
E N D
Image Sharing By Chinese Remainder Theorem Group S: S1, S2, S3 Institute of Information Systems & Applications National Tsing Hua University Hsinchu 30013, Taiwan E-mail: 104062613@m104.nthu.edu.tw
Abstract (摘要) Due to the rapid growth of informationacquisition in the era of the Internet ofThings (IoT) and Cloud Computing, the concernabout the security of private informationraises a lot of interests. This proposal aims to investigateimage sharing based on the concept of(k,n)-threshold strategy according to the Chineseremainder theorem (CRT). A secret imageis distributed into n noise-like shadow imagespreserved by n participants instead of asingle carrier. Collecting at least k out of nshadows can reveal the secret image, but fewerthan k shadow images could not. We’ll discussexisting CRT-based sharing methods, proposes asimple CRT-based method and illustrates (3,5)-threshold results for RGB color images.
Motivation and Problem Statement • To avoid the information is carried by only a single individual • Secret data are partitioned into n shadows which are distributed to n participants • By collecting at least k out of n shadows, we can completely recover the original data (information) • A (k,n)-threshold technique based on Chinese Remainder Theorem is adopted and implemented.
Background Review • The secret value S is used to generate n shadows • Any k or more shadows can recover the secret value S • Fewer than k shadows cannot reveal the secret value S • Commonly used (k,n)-threshold schemes for sharing • (1) Shamir [Sham1979] • (2) Blakley [Blak1979] • (3) Asmuth and Bloom [Asmu1983]
Expected Experimental Results Original image Shadow image3 Shadow image1 Shadow image2 Shadow image4 Shadow image5 Revealed image
Major References [1] C.C. Thien and J.C. Lin, ”Secret image sharing,” Compuers & Graphics, vol. 26, no. 1, 765-771, 2002. [2] M.H. Tsai and C.C. Chen, ”A Study on Secret Image Sharing,” The Sixth International Workshop on Image Media Quality and Its Applications, 135-139, Tokyo, Japan, September 12-13, 2013. [3] M. Ulutas, V.V. Nabiyev, and G. Ulutas, ”A New Secret Sharing Technique Based on Asmuth Bloom’s Scheme,” IEEE International Conference on Application of Information and Communication Technologies, 1-5, Baku, Oct. 14-16, 2009. [4]https://en.wikipedia.org/wiki/Secret_sharing_using_the_Chinese_remainder_theorem