Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(326.49KB)
This is an Open Access publication published under CSC-OpenAccess Policy.
Analysis of an Image Secret Sharing Scheme to Identify Cheaters
Jung-San LEe, Pei-Yu Lin, Chin-Chen Chang
Pages - 287 - 292     |    Revised - 30-08-2010     |    Published - 30-10-2010
Volume - 4   Issue - 4    |    Publication Date - October 2010  Table of Contents
MORE INFORMATION
KEYWORDS
steganography, bmp image, hide data
ABSTRACT
Secret image sharing mechanisms have been widely applied to the military, e-commerce, and communications fields. Zhao et al. introduced the concept of cheater detection into image sharing schemes recently. This functionality enables the image owner and authorized members to identify the cheater in reconstructing the secret image. Here, we provide an analysis of Zhao et al.¡¦s method: an authorized participant is able to restore the secret image by him/herself. This contradicts the requirement of secret image sharing schemes. The authorized participant utilizes an exhaustive search to achieve the attempt, though, simulation results show that it can be done within a reasonable time period.
CITED BY (1)  
1 Ghule, M. A. G., & Deshmukh, P. R. Secret Sharing An Effective Approach For Sharing Images.
1 Google Scholar
2 Academic Index
3 CiteSeerX
4 refSeek
5 iSEEK
6 Socol@r
7 Scribd
8 SlideShare
9 PDFCAST
10 PdfSR
1 The openSSL project, http://www.openssl.org
2 T. S. Chen and C. C. Chang. “New method of secret image sharing based on vector quantization”. Journal of Electronic Imaging, 10(4): 988-997, 2001
3 C. C. Chang and R. J. Hwang. “Sharing secret images using shadow codebooks”. Information Sciences, 335-345, 1998
4 C. C. Chang, C. Y. Lin and C. S. Tseng. “Secret image hiding and sharing based on the (t, n)- threshold”. Fundamenta Informaticae, 76(4): 399-411, 2007
5 C. Thien and J. Lin. “Secret image sharing”. Computer & Graphics, 26(1): 765-770, 2002
6 J. B. Feng, H. C. Wu, C. S. Tsai and Y. P. Chu. “A new multi-secret images sharing scheme using Lagrange’s Interpolation”. The Journal of Systems and Software, 76: 327-339, 2005
7 R. J. Hwang, W. B. Lee and C. C. Chang. “A concept of designing cheater identification methods for secret sharing”. The Journal of Systems and Software, 46: 7-11, 1999
8 R. Lukac and K. Plataniotis. “Colour image secret sharing”. Electronics Letters, 40(9): 529- 531, 2004
9 R. Rivest, A. Shamir and L. Adleman. “A method for obtaining digital signatures and public key cryptosystem”. Communications of the ACM, 21(2): 120-126, 1978
10 A. Shamir. “How to share a secret”. Communications of the ACM, 22(11): 612-613, 1979
11 W. Stallings. “Cryptography and Network Security – Principles and Practices”, Pearson Education Inc., Fourth Edition, pp. 238-241 (2006)
12 C. S. Tsai, C. C. Chang and T. S. Chen. “Sharing multiple secrets in digital images”. The Journal of Systems and Software, 64(2): 163-170, 2002
13 R. Wang and C. Su. “Secret image sharing with smaller shadow images”. Pattern Recognition Letters, 27: 551-555, 2006
14 R. Zhao, J. J. Zhao, F. Dai and F. Q. Zhao. “A new image secret sharing scheme to identify cheaters”. Computer Standards & Interfaces, 31(1): 252-257, 2009
Dr. Jung-San LEe
Feng Chia University - Taiwan
leejs@fcu.edu.tw
Dr. Pei-Yu Lin
Yuan Ze University - Taiwan
Professor Chin-Chen Chang
Feng Chia University - Taiwan