9 January 2013 Tamper-proof secret image-sharing scheme for identifying cheated secret keys and shared images
Author Affiliations +
Abstract
A (t,n) secret image-sharing scheme shares a secret image to n participants, and the t users recover the image. During the recovery procedure of a conventional secret image-sharing scheme, cheaters may use counterfeit secret keys or modified shared images to cheat other users’ secret keys and shared images. A cheated secret key or shared image leads to an incorrect secret image. Unfortunately, the cheater cannot be identified. We present an exponent and modulus-based scheme to provide a tamper-proof secret image-sharing scheme for identifying cheaters on secret keys or shared images. The proposed scheme allows users to securely select their secret key. This assignment can be performed over networks. Modulus results of each shared image is calculated to recognize cheaters of a shared image. Experimental results indicate that the proposed scheme is excellent at identifying cheated secret keys and shared images.
© The Authors. Published by SPIE under a Creative Commons Attribution 3.0 Unported License. Distribution or reproduction of this work in whole or in part requires full attribution of the original publication, including its DOI.
Chien-Chang Chen, Chien-Chang Chen, Chong-An Liu Liu, Chong-An Liu Liu, } "Tamper-proof secret image-sharing scheme for identifying cheated secret keys and shared images," Journal of Electronic Imaging 22(1), 013008 (9 January 2013). https://doi.org/10.1117/1.JEI.22.1.013008 . Submission:
JOURNAL ARTICLE
7 PAGES


SHARE
Back to Top