9 January 2013 Tamper-proof secret image-sharing scheme for identifying cheated secret keys and shared images
Author Affiliations +
J. of Electronic Imaging, 22(1), 013008 (2013). doi:10.1117/1.JEI.22.1.013008
Abstract
A (t,n) secret image-sharing scheme shares a secret image to n participants, and the t users recover the image. During the recovery procedure of a conventional secret image-sharing scheme, cheaters may use counterfeit secret keys or modified shared images to cheat other users’ secret keys and shared images. A cheated secret key or shared image leads to an incorrect secret image. Unfortunately, the cheater cannot be identified. We present an exponent and modulus-based scheme to provide a tamper-proof secret image-sharing scheme for identifying cheaters on secret keys or shared images. The proposed scheme allows users to securely select their secret key. This assignment can be performed over networks. Modulus results of each shared image is calculated to recognize cheaters of a shared image. Experimental results indicate that the proposed scheme is excellent at identifying cheated secret keys and shared images.
© The Authors. Published by SPIE under a Creative Commons Attribution 3.0 Unported License. Distribution or reproduction of this work in whole or in part requires full attribution of the original publication, including its DOI.
Chien-Chang Chen, Chong-An Liu Liu, "Tamper-proof secret image-sharing scheme for identifying cheated secret keys and shared images," Journal of Electronic Imaging 22(1), 013008 (9 January 2013). http://dx.doi.org/10.1117/1.JEI.22.1.013008
JOURNAL ARTICLE
7 PAGES


SHARE
KEYWORDS
Image processing

Cryptography

Network security

Visualization

Computer networks

Fourier transforms

Image analysis

RELATED CONTENT


Back to Top