Fake and Dishonest Participant Immune Secret Image Sharing

被引:4
作者
Yan, Xuehu [1 ]
Li, Longlong [1 ]
Sun, Lei [1 ]
Chen, Jia [1 ]
Wang, Shudong [1 ]
机构
[1] Natl Univ Def Technol, 460 HUANGSHAN Rd, Hefei 230037, Anhui, Peoples R China
基金
中国国家自然科学基金;
关键词
Secret image sharing; hash function; participant authentication; no pixel expansion; VISUAL CRYPTOGRAPHY; SCHEME; ROBUST;
D O I
10.1145/3572842
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secret image sharing (SIS) has received increased attention from the research community because of its usefulness in multiparty secure computing, access control, blockchain distributive storage and other security-oriented applications. Prevention of fake and dishonest participants is a key issue that has spurred interest in practical applications of SIS. Unfortunately, most previous SIS schemes failed to detect and locate fake or dishonest participants. In this article, an SIS for a (k, n)-threshold without pixel expansion is presented, which can detect and locate both fake and dishonest participants. Using a screening operation, the proposed approach fuses the benefits of polynomial-based SIS, visual cryptographic scheme (VCS), and hash functions to authenticate separate participants both with and without a dealer. In addition, the proposed approach achieves lossless rebuilding of the secret image. Analyses and experiments are conducted in this study to establish the effectiveness of the presented approach.
引用
收藏
页数:26
相关论文
共 43 条
  • [1] Secure Data Encryption Based on Quantum Walks for 5G Internet of Things Scenario
    Abd El-Latif, Ahmed A.
    Abd-El-Atty, Bassem
    Mazurczyk, Wojciech
    Fung, Carol
    Venegas-Andraca, Salvador E.
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (01): : 118 - 131
  • [2] Abd El-Latif Ahmed A., 2017, CLUSTER COMPUT
  • [3] Sharing secrets in stego images with authentication
    Chang, Chin-Chen
    Hsieh, Yi-Pei
    Lin, Chia-Hsuan
    [J]. PATTERN RECOGNITION, 2008, 41 (10) : 3130 - 3137
  • [4] Improved Visual Secret Sharing Scheme for QR Code Applications
    Cheng, Yuqiao
    Fu, Zhengxin
    Yu, Bin
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (09) : 2393 - 2403
  • [5] Chih-Ching Thien, 2002, Computers & Graphics, V26, P765, DOI 10.1016/S0097-8493(02)00131-0
  • [6] On the Relation of Random Grid and Deterministic Visual Cryptography
    De Prisco, Roberto
    De Santis, Alfredo
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (04) : 653 - 665
  • [7] Visual Cryptography and Random Grids Schemes
    Fu, Zheng-xin
    Yu, Bin
    [J]. DIGITAL-FORENSICS AND WATERMARKING, IWDW 2013, 2014, 8389 : 109 - 122
  • [8] A Proposal of a Secure P2P-type Storage Scheme by using the Secret Sharing and the Blockchain
    Fukumitsu, Masayuki
    Hasegawa, Shingo
    Iwazaki, Jun-Ya
    Sakai, Masao
    Takahashi, Daiki
    [J]. 2017 IEEE 31ST INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2017, : 803 - 810
  • [9] Threshold visual secret sharing by random grids with improved contrast
    Guo, Teng
    Liu, Feng
    Wu, ChuanKun
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2013, 86 (08) : 2094 - 2109
  • [10] A new threshold changeable secret sharing scheme based on the Chinese Remainder Theorem
    Jia, Xingxing
    Wang, Daoshun
    Nie, Daxin
    Luo, Xiangyang
    Sun, Jonathan Zheng
    [J]. INFORMATION SCIENCES, 2019, 473 : 13 - 30