9 January 2013 Tamper-proof secret image-sharing scheme for identifying cheated secret keys and shared images
Chien-Chang Chen, Chong-An Liu Liu
Author Affiliations +
Abstract
A (t,n) secret image-sharing scheme shares a secret image to n participants, and the t users recover the image. During the recovery procedure of a conventional secret image-sharing scheme, cheaters may use counterfeit secret keys or modified shared images to cheat other users’ secret keys and shared images. A cheated secret key or shared image leads to an incorrect secret image. Unfortunately, the cheater cannot be identified. We present an exponent and modulus-based scheme to provide a tamper-proof secret image-sharing scheme for identifying cheaters on secret keys or shared images. The proposed scheme allows users to securely select their secret key. This assignment can be performed over networks. Modulus results of each shared image is calculated to recognize cheaters of a shared image. Experimental results indicate that the proposed scheme is excellent at identifying cheated secret keys and shared images.
© The Authors. Published by SPIE under a Creative Commons Attribution 3.0 Unported License. Distribution or reproduction of this work in whole or in part requires full attribution of the original publication, including its DOI.
Chien-Chang Chen and Chong-An Liu Liu "Tamper-proof secret image-sharing scheme for identifying cheated secret keys and shared images," Journal of Electronic Imaging 22(1), 013008 (9 January 2013). https://doi.org/10.1117/1.JEI.22.1.013008
Published: 9 January 2013
Lens.org Logo
CITATIONS
Cited by 8 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Image processing

Cryptography

Network security

Visualization

Computer networks

Fourier transforms

Image analysis

Back to Top