Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
Analysis of an Image Secret Sharing Scheme to Identify Cheaters
Jung-San LEe, Pei-Yu Lin, Chin-Chen Chang
Pages - 287 - 292 | Revised - 30-08-2010 | Published - 30-10-2010
Published in International Journal of Image Processing (IJIP)
MORE INFORMATION
KEYWORDS
steganography, bmp image, hide data
ABSTRACT
Secret image sharing mechanisms have been widely applied to the military, e-commerce, and communications fields. Zhao et al. introduced the concept of cheater detection into image sharing schemes recently. This functionality enables the image owner and authorized members to identify the cheater in reconstructing the secret image. Here, we provide an analysis of Zhao et al.¡¦s method: an authorized participant is able to restore the secret image by him/herself. This contradicts the requirement of secret image sharing schemes. The authorized participant utilizes an exhaustive search to achieve the attempt, though, simulation results show that it can be done within a reasonable time period.
1 | Ghule, M. A. G., & Deshmukh, P. R. Secret Sharing An Effective Approach For Sharing Images. |
1 | Google Scholar |
2 | Academic Index |
3 | CiteSeerX |
4 | refSeek |
5 | iSEEK |
6 | Socol@r |
7 | Scribd |
8 | SlideShare |
9 | PDFCAST |
10 | PdfSR |
A. Shamir. “How to share a secret”. Communications of the ACM, 22(11): 612-613, 1979 | |
C. C. Chang and R. J. Hwang. “Sharing secret images using shadow codebooks”. Information Sciences, 335-345, 1998 | |
C. C. Chang, C. Y. Lin and C. S. Tseng. “Secret image hiding and sharing based on the (t, n)- threshold”. Fundamenta Informaticae, 76(4): 399-411, 2007 | |
C. S. Tsai, C. C. Chang and T. S. Chen. “Sharing multiple secrets in digital images”. The Journal of Systems and Software, 64(2): 163-170, 2002 | |
C. Thien and J. Lin. “Secret image sharing”. Computer & Graphics, 26(1): 765-770, 2002 | |
J. B. Feng, H. C. Wu, C. S. Tsai and Y. P. Chu. “A new multi-secret images sharing scheme using Lagrange’s Interpolation”. The Journal of Systems and Software, 76: 327-339, 2005 | |
R. J. Hwang, W. B. Lee and C. C. Chang. “A concept of designing cheater identification methods for secret sharing”. The Journal of Systems and Software, 46: 7-11, 1999 | |
R. Lukac and K. Plataniotis. “Colour image secret sharing”. Electronics Letters, 40(9): 529- 531, 2004 | |
R. Rivest, A. Shamir and L. Adleman. “A method for obtaining digital signatures and public key cryptosystem”. Communications of the ACM, 21(2): 120-126, 1978 | |
R. Wang and C. Su. “Secret image sharing with smaller shadow images”. Pattern Recognition Letters, 27: 551-555, 2006 | |
R. Zhao, J. J. Zhao, F. Dai and F. Q. Zhao. “A new image secret sharing scheme to identify cheaters”. Computer Standards & Interfaces, 31(1): 252-257, 2009 | |
T. S. Chen and C. C. Chang. “New method of secret image sharing based on vector quantization”. Journal of Electronic Imaging, 10(4): 988-997, 2001 | |
The openSSL project, http://www.openssl.org | |
W. Stallings. “Cryptography and Network Security – Principles and Practices”, Pearson Education Inc., Fourth Edition, pp. 238-241 (2006) | |
Dr. Jung-San LEe
Feng Chia University - Taiwan
leejs@fcu.edu.tw
Dr. Pei-Yu Lin
Yuan Ze University - Taiwan
Professor Chin-Chen Chang
Feng Chia University - Taiwan
|
|
|
|
View all special issues >> | |
|
|