{"title":"Essential Multi-Secret Image Sharing for Sensor Images.","authors":"Shang-Kuan Chen","doi":"10.3390/jimaging11070228","DOIUrl":null,"url":null,"abstract":"<p><p>In this paper, we propose an innovative <i>essential multi-secret image sharing (EMSIS)</i> scheme that integrates sensor data to securely and efficiently share multiple secret images of varying importance. Secret images are categorized into hierarchical levels and encoded into <i>essential shadows</i> and <i>fault-tolerant non-essential shares</i>, with access to higher-level secrets requiring higher-level essential shadows. By incorporating sensor data, such as location, time, or biometric input, into the encoding and access process, the scheme enables the context-aware and adaptive reconstruction of secrets based on real-world conditions. Experimental results demonstrate that the proposed method not only strengthens hierarchical access control, but also enhances robustness, flexibility, and situational awareness in secure image distribution systems.</p>","PeriodicalId":37035,"journal":{"name":"Journal of Imaging","volume":"11 7","pages":""},"PeriodicalIF":2.7000,"publicationDate":"2025-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC12295154/pdf/","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Imaging","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3390/jimaging11070228","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"IMAGING SCIENCE & PHOTOGRAPHIC TECHNOLOGY","Score":null,"Total":0}
引用次数: 0
Abstract
In this paper, we propose an innovative essential multi-secret image sharing (EMSIS) scheme that integrates sensor data to securely and efficiently share multiple secret images of varying importance. Secret images are categorized into hierarchical levels and encoded into essential shadows and fault-tolerant non-essential shares, with access to higher-level secrets requiring higher-level essential shadows. By incorporating sensor data, such as location, time, or biometric input, into the encoding and access process, the scheme enables the context-aware and adaptive reconstruction of secrets based on real-world conditions. Experimental results demonstrate that the proposed method not only strengthens hierarchical access control, but also enhances robustness, flexibility, and situational awareness in secure image distribution systems.