DocumentCode :
2621972
Title :
The Dual Verifying VSS Scheme Based on Digital Signature and Halftone Logo
Author :
Lin, Chia-Chen ; Chang, Chin-Chen ; Le, T. Hoang Ngan ; Le, Hoai Bac
Author_Institution :
Dept. of Comput. Sci. & Inf. Manage., Providence Univ., Taichung, Taiwan
fYear :
2010
fDate :
21-23 May 2010
Firstpage :
1
Lastpage :
6
Abstract :
This study presents a novel scheme called a dual verifying (t, n) visual secret sharing scheme. In our proposed scheme, each participant receives a public key and an encrypted shadow instead of the original secret image through the public communication network. There are three goals achieved. The first is to generate a reconstructed secret image, which satisfies the general criteria high security, high quality image, low computational complexity, and no pixel expansion. This goal is achieved by high compression ratio, low complexity and good performance techniques in combination with Shamir´s scheme. The second goal is to confirm shadow authentication by applying a digital signature scheme. The last goal is to verify the reliability of the reconstructed secret image by using an extracted halftone logo. The halftoning transform in this proposed scheme is executed with an error diffusion technique to guarantee image luminance and to enhance the quality of the reconstructed image. Moreover, a reversible data embedding technique is adopted to make sure each shadow not only carries authentication information but also maintains a small shadow size.
Keywords :
digital signatures; feature extraction; image coding; image enhancement; image reconstruction; public key cryptography; Shamir scheme; computational complexity; digital signature; dual verifying VSS scheme; encrypted shadow; halftone logo extraction; image quality enhancement; public key; reversible data embedding technique; secret image reconstruction; visual secret sharing scheme; Authentication; Communication networks; Computational complexity; Cryptography; Digital signatures; Image coding; Image reconstruction; Pixel; Public key; Variable structure systems;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Future Information Technology (FutureTech), 2010 5th International Conference on
Conference_Location :
Busan
Print_ISBN :
978-1-4244-6948-2
Type :
conf
DOI :
10.1109/FUTURETECH.2010.5482733
Filename :
5482733
Link To Document :
بازگشت