IACR News item: 30 August 2013
Teng Guo, Feng Liu, ChuanKun Wu, ChingNung Yang, Wen Wang, YaWei Ren
ePrint Reportthat any k shadow images can be used to reconstruct the secret image
exactly. In 2002, for (k; n)-TSISS, Thien and Lin reduced the size of each
shadow image to 1/k of the original secret image. Their main technique
is by adopting all coefficients of a (k-1)-degree polynomial to embed the secret pixels. This benet of small shadow size has drawn many researcher\'s attention and their technique has been extensively used in
the following studies. In this paper, we rst show that this technique
is neither information theoretic secure nor computational secure. Furthermore, we point out the security defect of previous (k; n)-TSISSs for
sharing textual images, and then fix up this security defect by adding an
AES encryption process. At last, we prove that this new (k; n)-TSISS is
computational secure.
Additional news items may be found on the IACR news page.