(k,n) secret image sharing scheme capable of cheating detection

Abstract In a (k,n) threshold secret image sharing scheme, a secret image is encrypted into n image-shadows that satisfy the following: (1) any less than k image-shadows get no information on the image and (2) any k or more image-shadows can reconstruct the entire image. Cheating problem is an impor...

Full description

Bibliographic Details
Main Authors: Yan-Xiao Liu, Qin-Dong Sun, Ching-Nung Yang
Format: Article
Language:English
Published: SpringerOpen 2018-04-01
Series:EURASIP Journal on Wireless Communications and Networking
Subjects:
Online Access:http://link.springer.com/article/10.1186/s13638-018-1084-7
id doaj-a973df4e5b56406592ab6ffa568b0123
record_format Article
spelling doaj-a973df4e5b56406592ab6ffa568b01232020-11-24T21:25:15ZengSpringerOpenEURASIP Journal on Wireless Communications and Networking1687-14992018-04-01201811610.1186/s13638-018-1084-7(k,n) secret image sharing scheme capable of cheating detectionYan-Xiao Liu0Qin-Dong Sun1Ching-Nung Yang2Department of Computer Science and Engineering, Xi’an University of TechnologyDepartment of Computer Science and Engineering, Xi’an University of TechnologyDepartment of CSIE, National Dong Hwa UniversityAbstract In a (k,n) threshold secret image sharing scheme, a secret image is encrypted into n image-shadows that satisfy the following: (1) any less than k image-shadows get no information on the image and (2) any k or more image-shadows can reconstruct the entire image. Cheating problem is an important issue in traditional secret sharing scheme. However, this issue has not been discussed sufficiently in the field of secret image sharing. In this paper, we consider the scenario of cheating behavior in secret image sharing scheme and construct a (k,n) threshold secret image sharing scheme which is capable of cheating detection. Our proposed scheme is able to detect the cheating behavior from up to k − 1 cheaters, and the size of image-shadow is almost same as the image-shadow in the original secret image sharing scheme.http://link.springer.com/article/10.1186/s13638-018-1084-7Secret sharingSecret image sharingCheating detection
collection DOAJ
language English
format Article
sources DOAJ
author Yan-Xiao Liu
Qin-Dong Sun
Ching-Nung Yang
spellingShingle Yan-Xiao Liu
Qin-Dong Sun
Ching-Nung Yang
(k,n) secret image sharing scheme capable of cheating detection
EURASIP Journal on Wireless Communications and Networking
Secret sharing
Secret image sharing
Cheating detection
author_facet Yan-Xiao Liu
Qin-Dong Sun
Ching-Nung Yang
author_sort Yan-Xiao Liu
title (k,n) secret image sharing scheme capable of cheating detection
title_short (k,n) secret image sharing scheme capable of cheating detection
title_full (k,n) secret image sharing scheme capable of cheating detection
title_fullStr (k,n) secret image sharing scheme capable of cheating detection
title_full_unstemmed (k,n) secret image sharing scheme capable of cheating detection
title_sort (k,n) secret image sharing scheme capable of cheating detection
publisher SpringerOpen
series EURASIP Journal on Wireless Communications and Networking
issn 1687-1499
publishDate 2018-04-01
description Abstract In a (k,n) threshold secret image sharing scheme, a secret image is encrypted into n image-shadows that satisfy the following: (1) any less than k image-shadows get no information on the image and (2) any k or more image-shadows can reconstruct the entire image. Cheating problem is an important issue in traditional secret sharing scheme. However, this issue has not been discussed sufficiently in the field of secret image sharing. In this paper, we consider the scenario of cheating behavior in secret image sharing scheme and construct a (k,n) threshold secret image sharing scheme which is capable of cheating detection. Our proposed scheme is able to detect the cheating behavior from up to k − 1 cheaters, and the size of image-shadow is almost same as the image-shadow in the original secret image sharing scheme.
topic Secret sharing
Secret image sharing
Cheating detection
url http://link.springer.com/article/10.1186/s13638-018-1084-7
work_keys_str_mv AT yanxiaoliu knsecretimagesharingschemecapableofcheatingdetection
AT qindongsun knsecretimagesharingschemecapableofcheatingdetection
AT chingnungyang knsecretimagesharingschemecapableofcheatingdetection
_version_ 1725983917465403392