题名

Progressive Share of Secret Audio by Chinese Remainder Theorem and Integer Wavelet Transform

DOI

10.7903/ijecs.1189

作者

Chien-Chang Chen;Jian-Ying Huang

关键词

(s ; t ; n) Thresholds ; Secret Audio Sharing ; Progressive ; Chinese Remainder Theorem

期刊名称

International Journal of Electronic Commerce Studies

卷期/出版年月

5卷2期(2014 / 12 / 01)

页次

219 - 231

内容语文

英文

英文摘要

This study presents an (s, t, n) progressive scheme for sharing a secret audio. In an (s, t, n) progressive audio sharing scheme, n shared audios are generated from the secret audio, gathering s shared audios acquires coarse resolution of the secret audio, and using t shared audios reconstructs the original secret audio losslessly. The Chinese Remainder Theorem is adopted in the proposed scheme to share filter results acquired from a 1-D integer wavelet transform with different thresholds for satisfying the progressive property. First, the maximum wavelet layer number needed in a 1-D integer wavelet transform is determined from thresholds s and t. Then, the proposed scheme applies the secret audio to a 1-D integer wavelet transform for acquiring filter results under different layers. Lastly, all wavelet coefficients are partitioned to (t-s+1) groups and share each group with different thresholds. The experimental results demonstrate that the proposed scheme can share secret audios efficiently and progressively.

主题分类 基礎與應用科學 > 資訊科學
社會科學 > 經濟學
社會科學 > 財金及會計學
社會科學 > 管理學
参考文献
  1. Hou, Y.C.,Quan, Z.Y.(2011).Progressive visual cryptography with unexpanded shares.IEEE Trans. on Circuits and Systems for Video Technology,21(11),1760-1764.
    連結:
  2. Hou, Y.C.,Quan, Z.Y.,Tsai, C.F.,Tseng, A.Y.(2013).Block-based progressive visual secret sharing.Information Sciences,233(1),290-304.
    連結:
  3. Chen, S.K.,Lin, J.C.(2005).Fault-tolerance and progressive transmission of images.Pattern Recognition,38(12),2466-2471.
  4. Fang, W.P.(2008).Friendly progressive visual secret sharing.Pattern Recognition,41(4),1410-1414.
  5. Fleet, J.V.(2008).Discrete wavelet transformations: An elementary approach with applications.Hoboken, N.J.:John Wiley & Sons.
  6. Huang, C.P.,Hsieh, C.H.,Huang, P.S.(2010).Progressive sharing for a secret image.Journal of Systems and Software,83(3),517-527.
  7. Hung, K.H.,Chang, Y.J.,Lin, J.C.(2008).Progressive sharing of an image.Optical Engineering,48(4),047006.
  8. Lin, S.J.,Chen, S.K.,Lin, J.C.(2010).Flip visual cryptography (FVC) with perfect security, conditionally-optimal contrast, and no expansion.Journal of Visual Communication and Image Research,21(8),900-916.
  9. Quisquater, M.,Preneel, B.,Vandewalla, J.(2002).On the security of the threshold scheme based on the Chinese remainder theorem.5th International Workshop on Practice and Theory in Public Key Cryptosystems,Paris, France:
  10. Shen, J.W.,Pan, F.,Guo, Y.(2012).Digital Audio Watermark Sharing Based on Chinese Remainder Theorem.5th International Congress on Image and Signal Processing,China:
  11. Shyu, S.J.,Chen, Y.R.(2008).Threshold Secret Image Sharing by Chinese Remainder Theorem.Proceedings of the IEEE Asia-Pacific Services Computing Conference,Yilan:
  12. Thien, C.C.,Lin, J.C.(2002).Secret image sharing.Computers & Graphics,26(5),765-770.