JOURNAL ARTICLE

Reversible Secret Image Sharing Based on Shamir's Scheme

Abstract

A novel secret image sharing scheme was proposed by Lin and Tsai in 2004. They claimed that their scheme can achieve the goal of secret image sharing with the additional capabilities of steganography and authentication. After that, Yang et al. indicated that the Lin-Tsai scheme has three weaknesses, and further proposed an improved scheme in 2007. This scheme not only achieved authentication ability and improved stego-image quality but also introduced a lossless image sharing scheme for secret images. However, none of these stego-images can be recovered in their original state in these schemes. In this paper, we propose a new scheme which not only maintains all advantages in Lin-Tsai's and Yang et al.'s schemes, but also overcomes this problem. According to the experimental simulations and discussions, we can prove that the proposed scheme has significantly better performance than the others.

Keywords:
Image sharing Secret sharing Scheme (mathematics) Steganography Computer science Shamir's Secret Sharing Image (mathematics) Homomorphic secret sharing Authentication (law) Lossless compression Theoretical computer science Algorithm Cryptography Mathematics Artificial intelligence Computer security Data compression

Metrics

8
Cited By
1.24
FWCI (Field Weighted Citation Impact)
16
Refs
0.85
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Advanced Steganography and Watermarking Techniques
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition
Chaos-based Image/Signal Encryption
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition
Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

JOURNAL ARTICLE

A generalization of Shamir's secret sharing scheme

Al. SutjijanaSubanar SubanarSuparna

Journal:   International Journal of Algebra Year: 2015 Vol: 9 Pages: 283-290
JOURNAL ARTICLE

The breadth of Shamir's secret-sharing scheme

Ed DawsonDiane Donovan

Journal:   Computers & Security Year: 1994 Vol: 13 (1)Pages: 69-78
JOURNAL ARTICLE

Several Generalizations of Shamir's Secret Sharing Scheme

Chun-Pong LaiCunsheng Ding

Journal:   International Journal of Foundations of Computer Science Year: 2004 Vol: 15 (02)Pages: 445-458
© 2026 ScienceGate Book Chapters — All rights reserved.