z-logo
open-access-imgOpen Access
Fake and dishonest participant location scheme in secret image sharing
Author(s) -
Jingju Liu,
Lei Sun,
Jinrui Liu,
Xuehu Yan
Publication year - 2021
Publication title -
mathematical biosciences and engineering
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.451
H-Index - 45
eISSN - 1551-0018
pISSN - 1547-1063
DOI - 10.3934/mbe.2021126
Subject(s) - verifiable secret sharing , lossless compression , image sharing , secret sharing , scheme (mathematics) , decoding methods , computer science , image (mathematics) , theoretical computer science , secure multi party computation , computer security , code (set theory) , encoding (memory) , algorithm , mathematics , computer vision , artificial intelligence , cryptography , data compression , mathematical analysis , set (abstract data type) , programming language
A (k,n) threshold secret image sharing (SIS) scheme divides a secret image into n shadows. One can reconstruct the secret image only when holding k or more than k shadows but cannot know any information on the secret from fewer than k shadows. Based on this characteristic, SIS has been widely used in access control, information hiding, distributed storage and other areas. Verifiable SIS aims to prevent malicious behaviour by attackers through verifying the authenticity of shadows and previous works did not solve this problem well. Our contribution is that we proposed a verifiable SIS scheme which combined CRT-based SIS and (2,n+1) threshold visual secret sharing(VSS). Our scheme is applicable no matter whether there exists a third party dealer. And it is worth mentioning that when the dealer is involved, our scheme can not only detect fake participants, but also locate dishonest participants. In general, loose screening criterion and efficient encoding and decoding rate of CRT-based SIS guarantee high-efficiency shadows generation and low recovery computation complexity. The uncertainty of the bits used for screening prevents malicious behavior by dishonest participants. In addition, our scheme has the advantages of lossless recovery, no pixel expansion and precise detection.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here