Home   >   CSC-OpenAccess Library   >    Manuscript Information
Analysis of an Image Secret Sharing Scheme to Identify Cheaters
Jung-San LEe, Pei-Yu Lin, Chin-Chen Chang
Pages - 287 - 292     |    Revised - 30-08-2010     |    Published - 30-10-2010
Volume - 4   Issue - 4    |    Publication Date - October 2010  Table of Contents
MORE INFORMATION
KEYWORDS
steganography, bmp image, hide data
ABSTRACT
Secret image sharing mechanisms have been widely applied to the military, e-commerce, and communications fields. Zhao et al. introduced the concept of cheater detection into image sharing schemes recently. This functionality enables the image owner and authorized members to identify the cheater in reconstructing the secret image. Here, we provide an analysis of Zhao et al.¡¦s method: an authorized participant is able to restore the secret image by him/herself. This contradicts the requirement of secret image sharing schemes. The authorized participant utilizes an exhaustive search to achieve the attempt, though, simulation results show that it can be done within a reasonable time period.
CITED BY (1)  
1 Ghule, M. A. G., & Deshmukh, P. R. Secret Sharing An Effective Approach For Sharing Images.
1 Google Scholar 
2 Academic Index 
3 CiteSeerX 
4 refSeek 
5 iSEEK 
6 Socol@r  
7 Scribd 
8 SlideShare 
9 PDFCAST 
10 PdfSR 
A. Shamir. “How to share a secret”. Communications of the ACM, 22(11): 612-613, 1979
C. C. Chang and R. J. Hwang. “Sharing secret images using shadow codebooks”. Information Sciences, 335-345, 1998
C. C. Chang, C. Y. Lin and C. S. Tseng. “Secret image hiding and sharing based on the (t, n)- threshold”. Fundamenta Informaticae, 76(4): 399-411, 2007
C. S. Tsai, C. C. Chang and T. S. Chen. “Sharing multiple secrets in digital images”. The Journal of Systems and Software, 64(2): 163-170, 2002
C. Thien and J. Lin. “Secret image sharing”. Computer & Graphics, 26(1): 765-770, 2002
J. B. Feng, H. C. Wu, C. S. Tsai and Y. P. Chu. “A new multi-secret images sharing scheme using Lagrange’s Interpolation”. The Journal of Systems and Software, 76: 327-339, 2005
R. J. Hwang, W. B. Lee and C. C. Chang. “A concept of designing cheater identification methods for secret sharing”. The Journal of Systems and Software, 46: 7-11, 1999
R. Lukac and K. Plataniotis. “Colour image secret sharing”. Electronics Letters, 40(9): 529- 531, 2004
R. Rivest, A. Shamir and L. Adleman. “A method for obtaining digital signatures and public key cryptosystem”. Communications of the ACM, 21(2): 120-126, 1978
R. Wang and C. Su. “Secret image sharing with smaller shadow images”. Pattern Recognition Letters, 27: 551-555, 2006
R. Zhao, J. J. Zhao, F. Dai and F. Q. Zhao. “A new image secret sharing scheme to identify cheaters”. Computer Standards & Interfaces, 31(1): 252-257, 2009
T. S. Chen and C. C. Chang. “New method of secret image sharing based on vector quantization”. Journal of Electronic Imaging, 10(4): 988-997, 2001
The openSSL project, http://www.openssl.org
W. Stallings. “Cryptography and Network Security – Principles and Practices”, Pearson Education Inc., Fourth Edition, pp. 238-241 (2006)
Dr. Jung-San LEe
Feng Chia University - Taiwan
leejs@fcu.edu.tw
Dr. Pei-Yu Lin
Yuan Ze University - Taiwan
Professor Chin-Chen Chang
Feng Chia University - Taiwan


CREATE AUTHOR ACCOUNT
 
LAUNCH YOUR SPECIAL ISSUE
View all special issues >>
 
PUBLICATION VIDEOS