2013
DOI: 10.1117/1.jei.22.1.013008
|View full text |Cite
|
Sign up to set email alerts
|

Tamper-proof secret image-sharing scheme for identifying cheated secret keys and shared images

Abstract: A ðt; nÞ secret image-sharing scheme shares a secret image to n participants, and the t users recover the image. During the recovery procedure of a conventional secret image-sharing scheme, cheaters may use counterfeit secret keys or modified shared images to cheat other users' secret keys and shared images. A cheated secret key or shared image leads to an incorrect secret image. Unfortunately, the cheater cannot be identified. We present an exponent and modulus-based scheme to provide a tamperproof secret ima… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…The security of image secret sharing is reduced. Most image secret sharing schemes [14][15][16][17] based on Interpolation polynomial choose the continuous and unprocessed pixels instead of random numbers as the coefficients of the polynomial. Since the neighbor pixels have similar values, the generated shadow images may include much information about the secret image.…”
Section: Introductionmentioning
confidence: 99%
“…The security of image secret sharing is reduced. Most image secret sharing schemes [14][15][16][17] based on Interpolation polynomial choose the continuous and unprocessed pixels instead of random numbers as the coefficients of the polynomial. Since the neighbor pixels have similar values, the generated shadow images may include much information about the secret image.…”
Section: Introductionmentioning
confidence: 99%
“…Then, many researchers proposed other functional secret image sharing schemes, such as reduced load for sharing multiple secret images 2,3 , cheater identification 4 , progressive sharing 5,6 , weighted sharing 7 , visual cryptography and secret image sharing 8 , authentication strength 9 , and scalable sharing 10 .…”
Section: Introductionmentioning
confidence: 99%