8Sharing Secret Images and 3D Objects
Sébastien BEUGNON, Pauline PUTEAUX and William PUECH
LIRMM, Université de Montpellier, CNRS, France
Secret sharing was developed in 1979 by Blakley (1979) and (Shamir 1979) in response to problems associated with classic encryption methods. Unlike cryptographic systems, secret sharing does not rely on the use of a key, allowing secret data to be exchanged between several people. The scope of secret sharing was extended to new areas of security in the 1990s. With the evolution of encryption techniques, secret sharing began to be adapted for multimedia data, notably for images (Naor and Shamir 1994). Interest in secret image protection and sharing was revived in 2002, when Shamir’s method (Shamir 1979) was applied without affecting image format (Thien and Lin 2002). Work on secret sharing for 3D objects began in 2010 (Elsheh and Hamza 2010).
8.1. Introduction
The concept of secret sharing was developed in the late 1970s by Blakley (1979). Shamir (1979) worked independently, to solve the problems associated with the classic encryption approaches described in Chapters 4, 6 and 7. A major drawback of these approaches is that they require a key, and that the secret is limited to a single container. The container may be lost, destroyed or tampered with during an attack, meaning that the secret can no longer be retrieved. The applications of secret sharing have evolved since the 1980s. Nowadays, secret sharing offers a response to new problems ...
Get Multimedia Security 2 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.