(k, n) secret image sharing scheme capable of cheating detection

被引:28
作者
Liu, Yan-Xiao [1 ]
Sun, Qin-Dong [1 ]
Yang, Ching-Nung [2 ]
机构
[1] Xian Univ Technol, Dept Comp Sci & Engn, Xian, Shaanxi, Peoples R China
[2] Natl Dong Hwa Univ, Dept CSIE, Shoufeng, Hualien County, Taiwan
关键词
Secret sharing; Secret image sharing; Cheating detection; AUTHENTICATION; STEGANOGRAPHY;
D O I
10.1186/s13638-018-1084-7
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In a (k, n) threshold secret image sharing scheme, a secret image is encrypted into n image-shadows that satisfy the following: (1) any less than k image-shadows get no information on the image and (2) any k or more image-shadows can reconstruct the entire image. Cheating problem is an important issue in traditional secret sharing scheme. However, this issue has not been discussed sufficiently in the field of secret image sharing. In this paper, we consider the scenario of cheating behavior in secret image sharing scheme and construct a (k, n) threshold secret image sharing scheme which is capable of cheating detection. Our proposed scheme is able to detect the cheating behavior from up to k - 1 cheaters, and the size of image-shadow is almost same as the image-shadow in the original secret image sharing scheme.
引用
收藏
页数:6
相关论文
共 20 条
[1]   Secret sharing schemes with detection of cheaters for a general access structure [J].
Cabello, S ;
Padró, C ;
Sáez, G .
DESIGNS CODES AND CRYPTOGRAPHY, 2002, 25 (02) :175-188
[2]   Sharing secrets in stego images with authentication [J].
Chang, Chin-Chen ;
Hsieh, Yi-Pei ;
Lin, Chia-Hsuan .
PATTERN RECOGNITION, 2008, 41 (10) :3130-3137
[3]   Detection and identification of cheaters in (t, n) secret sharing scheme [J].
Harn, Lein ;
Lin, Changlu .
DESIGNS CODES AND CRYPTOGRAPHY, 2009, 52 (01) :15-24
[4]  
Kurosawa K, 1995, LNCS, V563, P410
[5]   Secret image sharing with steganography and authentication [J].
Lin, CC ;
Tsai, WH .
JOURNAL OF SYSTEMS AND SOFTWARE, 2004, 73 (03) :405-414
[6]   Reducing shadow size in smooth scalable secret image sharing [J].
Liu, Yan-Xiao ;
Yang, Ching-Nung ;
Yeh, Po-Han .
SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (12) :2237-2244
[7]   Efficient t-cheater identifiable (k, n) secret-sharing scheme for t ≤ left perpendicular((k-2)/2)right perpendicular [J].
Liu, Yan-Xiao .
IET INFORMATION SECURITY, 2014, 8 (01) :37-41
[8]   Scalable secret image sharing scheme with essential shadows [J].
Liu, Yanxiao ;
Yang, Chingnung .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2017, 58 :49-55
[9]   An Improved Authenticated Group Key Transfer Protocol Based on Secret Sharing [J].
Liu, Yining ;
Cheng, Chi ;
Cao, Jianyu ;
Jiang, Tao .
IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (11) :2335-2336
[10]  
Obana S, 2011, LECT NOTES COMPUT SC, V6632, P284, DOI 10.1007/978-3-642-20465-4_17