An efficient verifiable secret sharing using steganographic technology based on convolutional codes for halftone images

Hsi Yuan Chang, Chin Hsing Chen, Jyun Jie Wang, Chi Yuan Lin, Chun Hsien Tsai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This work presented not only a modified verifiable secret sharing (VSS) system but also a high security halftone image with low distortion. Reliability of sequence transmission is required in the design of VSS systems. Another major topic of VSS systems for transmission is the control of binary errors so that the VSS sequence can be reliably reproduced. The modified VSS systems differ from original VSS systems in that the output of systems and encoded technology are combined into a merging system. The embedding distortion directly influences the security of images; thus, modified VSS systems emphasize distortion level. Modified VSS systems have some advantages over conventional VSS systems: (1) the modified VSS systems are capable of achieving the reliability; (2) the proposed schemes offer low computational cost; and (3) they allow multiple shadows.

Original languageEnglish
Title of host publication4th International Symposium on Bioelectronics and Bioinformatics, ISBB 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages115-119
Number of pages5
ISBN (Electronic)9781467366090
DOIs
Publication statusPublished - 2015 Dec 2
Event4th International Symposium on Bioelectronics and Bioinformatics, ISBB 2015 - Beijing, China
Duration: 2015 Oct 142015 Oct 17

Publication series

Name4th International Symposium on Bioelectronics and Bioinformatics, ISBB 2015

Other

Other4th International Symposium on Bioelectronics and Bioinformatics, ISBB 2015
CountryChina
CityBeijing
Period15-10-1415-10-17

All Science Journal Classification (ASJC) codes

  • Health Informatics
  • Biotechnology
  • Signal Processing
  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'An efficient verifiable secret sharing using steganographic technology based on convolutional codes for halftone images'. Together they form a unique fingerprint.

Cite this