期刊文献+

Media Sharing Scheme with Cheater Identification and Content Reconstruction

Media Sharing Scheme with Cheater Identification and Content Reconstruction
在线阅读 下载PDF
导出
摘要 For digital communication, distributed storage and management of media contents over system holders are critical issues. In this article, an efficient verifiable sharing scheme is proposed that can satisfy significant essentials of distribution sharing and can achieve a iossless property of host media. Verifiability allows holders to detect and identify counterfeited shadows during cooperation in order to prevent cheaters. Only authorized holders can reveal the lossless shared content and then reconstruct the original host image. Shared media capacity is adjustable and proportional to the increase of the number of the distributed holders t. The more distributed holders, the larger the shared media capacity is. Moreover, the ability to reconstruct the image preserves the fidelity of valuable host media, such as military and medical images. According to the results, the proposed approach can achieve superior performance to that of related sharing schemes for effectively providing distributed media management and storage. For digital communication, distributed storage and management of media contents over system holders are critical issues. In this article, an efficient verifiable sharing scheme is proposed that can satisfy significant essentials of distribution sharing and can achieve a iossless property of host media. Verifiability allows holders to detect and identify counterfeited shadows during cooperation in order to prevent cheaters. Only authorized holders can reveal the lossless shared content and then reconstruct the original host image. Shared media capacity is adjustable and proportional to the increase of the number of the distributed holders t. The more distributed holders, the larger the shared media capacity is. Moreover, the ability to reconstruct the image preserves the fidelity of valuable host media, such as military and medical images. According to the results, the proposed approach can achieve superior performance to that of related sharing schemes for effectively providing distributed media management and storage.
作者 Pei-Yu Lin
出处 《Journal of Electronic Science and Technology》 CAS 2011年第4期332-338,共7页 电子科技学刊(英文版)
关键词 Cheater identification LOSSLESS RECONSTRUCTION SHARING verification. Cheater identification, lossless, reconstruction, sharing, verification.
  • 相关文献

参考文献11

  • 1Martin Tompa,Heather Woll.How to share a secret with cheaters[J].Journal of Cryptology.1989(3)
  • 2M. Naor,A. Shamir."Visual cryptography,"[].Lecture Notes in Computer Science.1995
  • 3A. Beimel,B. Chor."Secret sharing with public reconstruction,"[].IEEE Transactions on Information Theory.1998
  • 4P.-Y. Lin."Verifiable and lossless distributed media content sharing,"[].Lecture Notes in Computer Science.2011
  • 5C.-N. Yang,T.-S. Chen,K.-H. Yu,C.-C. Wang."Improvements of image sharing with steganography and authentication,"[].The Journal of Systems and Software.2007
  • 6Z. Eslami,S. H. Razzaghi,J. Z. Ahmadabadi."Secret image sharing based on cellular automata and steganography,"[].Pattern Recognition.2010
  • 7C.-C. Chang,Y.-H. Chen,H.-C. Wang."Meaningful secret sharing technique with authentication and remedy abilities,"[].Journal of Information Science.2011
  • 8T.-Y. Liu,W.-H. Tsai."Generic lossless visible watermarking-a new approach,"[].IEEE Transactions on Image Processing.2010
  • 9X.-T. Zeng,L.-D. Ping,X.-Z. Pan."A lossless robust data hiding scheme,"[].Pattern Recognition.2010
  • 10P.-Y. Lin,J.-S. Lee,C.-C. Chang."Distortion-free secret image sharing mechanism using modulus operator,"[].Pattern Recognition.2009

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部