(k,n) secret image sharing scheme capable of cheating detection
Abstract In a (k,n) threshold secret image sharing scheme, a secret image is encrypted into n image-shadows that satisfy the following: (1) any less than k image-shadows get no information on the image and (2) any k or more image-shadows can reconstruct the entire image. Cheating problem is an impor...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
SpringerOpen
2018-04-01
|
Series: | EURASIP Journal on Wireless Communications and Networking |
Subjects: | |
Online Access: | http://link.springer.com/article/10.1186/s13638-018-1084-7 |
id |
doaj-a973df4e5b56406592ab6ffa568b0123 |
---|---|
record_format |
Article |
spelling |
doaj-a973df4e5b56406592ab6ffa568b01232020-11-24T21:25:15ZengSpringerOpenEURASIP Journal on Wireless Communications and Networking1687-14992018-04-01201811610.1186/s13638-018-1084-7(k,n) secret image sharing scheme capable of cheating detectionYan-Xiao Liu0Qin-Dong Sun1Ching-Nung Yang2Department of Computer Science and Engineering, Xi’an University of TechnologyDepartment of Computer Science and Engineering, Xi’an University of TechnologyDepartment of CSIE, National Dong Hwa UniversityAbstract In a (k,n) threshold secret image sharing scheme, a secret image is encrypted into n image-shadows that satisfy the following: (1) any less than k image-shadows get no information on the image and (2) any k or more image-shadows can reconstruct the entire image. Cheating problem is an important issue in traditional secret sharing scheme. However, this issue has not been discussed sufficiently in the field of secret image sharing. In this paper, we consider the scenario of cheating behavior in secret image sharing scheme and construct a (k,n) threshold secret image sharing scheme which is capable of cheating detection. Our proposed scheme is able to detect the cheating behavior from up to k − 1 cheaters, and the size of image-shadow is almost same as the image-shadow in the original secret image sharing scheme.http://link.springer.com/article/10.1186/s13638-018-1084-7Secret sharingSecret image sharingCheating detection |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Yan-Xiao Liu Qin-Dong Sun Ching-Nung Yang |
spellingShingle |
Yan-Xiao Liu Qin-Dong Sun Ching-Nung Yang (k,n) secret image sharing scheme capable of cheating detection EURASIP Journal on Wireless Communications and Networking Secret sharing Secret image sharing Cheating detection |
author_facet |
Yan-Xiao Liu Qin-Dong Sun Ching-Nung Yang |
author_sort |
Yan-Xiao Liu |
title |
(k,n) secret image sharing scheme capable of cheating detection |
title_short |
(k,n) secret image sharing scheme capable of cheating detection |
title_full |
(k,n) secret image sharing scheme capable of cheating detection |
title_fullStr |
(k,n) secret image sharing scheme capable of cheating detection |
title_full_unstemmed |
(k,n) secret image sharing scheme capable of cheating detection |
title_sort |
(k,n) secret image sharing scheme capable of cheating detection |
publisher |
SpringerOpen |
series |
EURASIP Journal on Wireless Communications and Networking |
issn |
1687-1499 |
publishDate |
2018-04-01 |
description |
Abstract In a (k,n) threshold secret image sharing scheme, a secret image is encrypted into n image-shadows that satisfy the following: (1) any less than k image-shadows get no information on the image and (2) any k or more image-shadows can reconstruct the entire image. Cheating problem is an important issue in traditional secret sharing scheme. However, this issue has not been discussed sufficiently in the field of secret image sharing. In this paper, we consider the scenario of cheating behavior in secret image sharing scheme and construct a (k,n) threshold secret image sharing scheme which is capable of cheating detection. Our proposed scheme is able to detect the cheating behavior from up to k − 1 cheaters, and the size of image-shadow is almost same as the image-shadow in the original secret image sharing scheme. |
topic |
Secret sharing Secret image sharing Cheating detection |
url |
http://link.springer.com/article/10.1186/s13638-018-1084-7 |
work_keys_str_mv |
AT yanxiaoliu knsecretimagesharingschemecapableofcheatingdetection AT qindongsun knsecretimagesharingschemecapableofcheatingdetection AT chingnungyang knsecretimagesharingschemecapableofcheatingdetection |
_version_ |
1725983917465403392 |