Verifiable Image Secret Sharing in Matrix Projection Using Watermarking

被引:0
作者
Patil, Sonali [1 ]
Deshmukh, Prashant [1 ]
机构
[1] Sipna Coll Engn & Technol, Dept Comp, Amravati 444701, Maharashtra, India
来源
2014 INTERNATIONAL CONFERENCE ON CIRCUITS, SYSTEMS, COMMUNICATION AND INFORMATION TECHNOLOGY APPLICATIONS (CSCITA) | 2014年
关键词
Secret sharing; Verifiable Secret Sharing; Matrix Projection; Information Security; Network Security; Watermarking;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Verifiable Secret Sharing Schemes (VSSS) allow the participants to verify their shares as consistent. Verifiable Secret Sharing provides the verifiability of the received shares to the participants. Most of these schemes require additional computation in the form of certificate vectors or error correction codes. This paper presents a threshold verifiable secret sharing in Matrix Projection using watermarking. In this scheme at the time of construction of shares a watermark image (which is public image) is shared along with the secret image. During reconstruction phase two images get retrieved - watermark image and secret image. The verification of the retrieved watermark image verifies the accuracy of reconstructed secret image. The addition of watermark image is not increasing the size of image shares. The proposed scheme achieves reliability and verifiability by combining matrix projection secret sharing with watermarking.
引用
收藏
页码:225 / 229
页数:5
相关论文
共 14 条
[1]  
BAI L, 2006, P 2 IEEE INT S DEP A
[2]  
BAI L, 2006, 2 INT WORKSH TRUST S
[3]  
Blakley G.R., 1979, INT WORKSH MAN REQ K, DOI [10.1109/MARK.1979.8817296, DOI 10.1109/MARK.1979.8817296]
[4]  
Chan Chao-Wen, 2009, IEEE INT C NETW SEC
[5]  
Chang Chen, 2011, J INFORM HIDING MULT, V2
[6]  
Feldman P., 1987, 28th Annual Symposium on Foundations of Computer Science (Cat. No.87CH2471-1), P427, DOI 10.1109/SFCS.1987.4
[7]  
Harn Lein, 2009, DETECTION IDENTIFICA
[8]  
Iftene S., 2007, TECHNICAL REPORT
[9]  
Patil Sonali, 2012, INT J COMPUTER APPL, V46, P5
[10]  
Patil Sonali, 2012, INT J COMPUTER APPL, P6