A verifiable threshold secret image sharing (SIS) scheme with combiner verification and cheater identification

被引:3
作者
Soreng A.V. [1 ]
Kandar S. [1 ]
机构
[1] Department of Information Technology, Indian Institute of Engineering Science and Technology, Shibpur
关键词
Bitwise OR; Cheater identification; Combiner verification; Threshold secret sharing; Verifiable secret image sharing (VSIS);
D O I
10.1007/s12652-022-04339-1
中图分类号
学科分类号
摘要
Image transmission is gaining importance with the advancement of information communication technology. Transmission of sensitive images in diverse applications like military, diplomatic, and medical sector requires special attention so that those are not placed in the wrong hands. Secret sharing is a technique in information security applicable for group use of a secret. In secret sharing, all the actors are considered to be trusted but in a real scenario, there is the possibility of cheating. In this current research, a verifiable secret image sharing (VSIS) is proposed which is a threshold scheme and can identify a cheater. The sharing is done by bitwise OR and verifiability is added using XOR and hash operation. The participants are provided only shadow shares not the original and combiner authentication is done by the participants before submitting information. Experimental results and security analysis provides acceptability and comparison analysis with some existing schemes provides it a strong base. © 2022, The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature.
引用
收藏
页码:10631 / 10655
页数:24
相关论文
共 83 条
  • [1] Elshamyalhamad A.M.A., Optical image cryptosystem using double random phase encoding and arnold’s cat map. Optical and quantum electronics, Journal of Electronic Imagingg, 48, 3, pp. 1-18, (2016)
  • [2] Chattopadhyay A.K., Nag A., Singh J.P., Singh A.K., pp. 1-30, (2020)
  • [3] Chattopadhyay A.K., Nag A., Singh J.P., pp. 1-31, (2021)
  • [4] Paul A., Kandar S., Dhara B.C., pp. 1-20, (2022)
  • [5] Paul A., Kandar S., pp. 1-24, (2022)
  • [6] Soreng A.V., Kandar S.
  • [7] Abbas S.Q., Ahmed F., Chen Y.-P.P., Perceptual image hashing using transform domain noise resistant local binary pattern, Multimedia Tools and Applications, 80, 7, pp. 9849-9875, (2021)
  • [8] Asmuth C., Bloom J., A modular approach to key safeguarding, IEEE Trans Inf Theory, 29, 2, pp. 208-210, (1983)
  • [9] Babamir F.S., Kirci M., A multibiometric cryptosystem for user authentication in client-server networks, Comput Netw, 181, (2020)
  • [10] Bai L., 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, IEEE, 2006, pp. 31-36, (2006)