About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Quality, Reliability, Security and Robustness in Heterogeneous Networks. 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers

Research Article

Secret Image Sharing Scheme Based on Pixel Replacement

Download(Requires a free EAI acccount)
455 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-642-37949-9_46,
        author={Tapasi Bhattacharjee and Jyoti Singh},
        title={Secret Image Sharing Scheme Based on Pixel Replacement},
        proceedings={Quality, Reliability, Security and Robustness in Heterogeneous Networks. 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers},
        proceedings_a={QSHINE},
        year={2013},
        month={7},
        keywords={Secret sharing Visual Secret Sharing Security Structured Similarity Index Metric Peak Signal to Noise Ratio},
        doi={10.1007/978-3-642-37949-9_46}
    }
    
  • Tapasi Bhattacharjee
    Jyoti Singh
    Year: 2013
    Secret Image Sharing Scheme Based on Pixel Replacement
    QSHINE
    Springer
    DOI: 10.1007/978-3-642-37949-9_46
Tapasi Bhattacharjee1,*, Jyoti Singh2,*
  • 1: Techno India
  • 2: National Institute of Technology Patna
*Contact email: tapasi.dgp@gmail.com, jyotip.singh@gmail.com

Abstract

Dividing an image in several components and sharing through different channel is popular way of sharing and storing sensitive image data. We proposes here a simple image secret sharing method based on random matrices. These random matrices act as key for secret sharing. The technique allows a secret image to be divided into three image shares where each share individually looks meaningless. To reconstruct the secret image all three shares have to be used. This method has no pixel expansion and can reconstruct the secret image precisely. This scheme can be directly applied on gray scale images and can easily be extended to binary and color images. Experimental results prove that this scheme can generate good quality of reconstructed images.

Keywords
Secret sharing Visual Secret Sharing Security Structured Similarity Index Metric Peak Signal to Noise Ratio
Published
2013-07-09
http://dx.doi.org/10.1007/978-3-642-37949-9_46
Copyright © 2013–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL