{"title":"使用两个阴影在云中共享一个秘密图像","authors":"Yu Chen, Jiang-Yi Lin, Chinchen Chang, Yu-Chen Hu","doi":"10.6633/IJNS.202007_22(4).01","DOIUrl":null,"url":null,"abstract":"In this paper, we present a novel (2, 2) reversible secret image sharing scheme. Our scheme permits secret messages to be shared with two participants by splitting the marked encrypted image into two shadows. The secret messages can be reconstructed if two participants collaborate with each other. The proposed scheme chooses suitable binary blocks of a cover image in which to embed the secret message and divides those blocks into two shadow blocks by executing a logical operation with all of the other binary blocks, thereby producing two shadows. In the data extraction procedure, the secret messages and the cover image can be reconstructed by the logical operation of the corresponding binary blocks of the two shadows. A practical application is demonstrated by modeling our scheme as a reversible watermarking scheme in the Cloud. The experimental results indicated that the proposed method is reversible and that it can restore the image and watermark properly.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"45 1","pages":"551-560"},"PeriodicalIF":0.0000,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Sharing a Secret Image in the Cloud Using Two Shadows\",\"authors\":\"Yu Chen, Jiang-Yi Lin, Chinchen Chang, Yu-Chen Hu\",\"doi\":\"10.6633/IJNS.202007_22(4).01\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we present a novel (2, 2) reversible secret image sharing scheme. Our scheme permits secret messages to be shared with two participants by splitting the marked encrypted image into two shadows. The secret messages can be reconstructed if two participants collaborate with each other. The proposed scheme chooses suitable binary blocks of a cover image in which to embed the secret message and divides those blocks into two shadow blocks by executing a logical operation with all of the other binary blocks, thereby producing two shadows. In the data extraction procedure, the secret messages and the cover image can be reconstructed by the logical operation of the corresponding binary blocks of the two shadows. A practical application is demonstrated by modeling our scheme as a reversible watermarking scheme in the Cloud. The experimental results indicated that the proposed method is reversible and that it can restore the image and watermark properly.\",\"PeriodicalId\":93303,\"journal\":{\"name\":\"International journal of network security & its applications\",\"volume\":\"45 1\",\"pages\":\"551-560\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International journal of network security & its applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.6633/IJNS.202007_22(4).01\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International journal of network security & its applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.6633/IJNS.202007_22(4).01","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Sharing a Secret Image in the Cloud Using Two Shadows
In this paper, we present a novel (2, 2) reversible secret image sharing scheme. Our scheme permits secret messages to be shared with two participants by splitting the marked encrypted image into two shadows. The secret messages can be reconstructed if two participants collaborate with each other. The proposed scheme chooses suitable binary blocks of a cover image in which to embed the secret message and divides those blocks into two shadow blocks by executing a logical operation with all of the other binary blocks, thereby producing two shadows. In the data extraction procedure, the secret messages and the cover image can be reconstructed by the logical operation of the corresponding binary blocks of the two shadows. A practical application is demonstrated by modeling our scheme as a reversible watermarking scheme in the Cloud. The experimental results indicated that the proposed method is reversible and that it can restore the image and watermark properly.