Cheating identifiable polynomial based secret sharing scheme for audio and image

被引:2
|
作者
Prashanti, Guttikonda [1 ,2 ]
Bhat, Mundukur Nirupama [1 ]
机构
[1] Vignans Fdn Sci Technol & Res, Vadlamudi, Andhra Prades, India
[2] Koneru Lakshmaiah Educ Fdn, Dept CSE, Vaddeswaram, AP, India
关键词
Polynomial; Secret sharing; Polynomial function; Coefficients; Discrete logarithms; Security channel; Verification; Dishonest participant; Multi secret; Encoding; Decoding; PRIVACY; STEGANOGRAPHY;
D O I
10.1007/s11042-023-15625-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Polynomial based secret sharing is the art of protecting information and a tool used in areas where a secret has to be distributed among multiple parties. In this method, secret is encrypted into noisy shares and transferred to participants in the group. Decoding of secret is possible only when sufficient number of authorized members in the group, stack their respective shares. In this article, polynomial based secret sharing for audio is proposed that computes a checksum to identify the dishonest participant and also the audio shares generated are of smaller dimension. To achieve this, a polynomial function is defined by considering amplitude values and random values as coefficients. Inclusion of random value as the coefficient of higher degree term in the polynomial makes the audio shares noisy and does not provide any information about the secret. This reduces the overhead of performing preprocessing on original audio before shares are generated. In addition, our proposed method can be used for multi secret sharing. Proposed scheme also facilitates identification of dishonest participant before reconstruction of secret through a trusted entity called combiner.
引用
收藏
页码:403 / 423
页数:21
相关论文
共 50 条
  • [41] Cheating on a Visual Secret Sharing Scheme under a Realistic Scenario
    Lumyong, Pichanee
    Iwamoto, Mitsugu
    Ohta, Kazuo
    [J]. 2014 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA), 2014, : 575 - 579
  • [42] A cheater identifiable multi-secret sharing scheme based on the Chinese remainder theorem
    Chen, Zhenhua
    Li, Shundong
    Zhu, Youwen
    Yan, Jianhua
    Xu, Xinli
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3592 - 3601
  • [43] Audio feature extraction scheme based on secret sharing and wavelet transform
    Hsieh, Shang-Lin
    Chang, Teng-Kuei
    Huang, Bin-Yuan
    Tsai, I-Ju
    [J]. INT CONF ON CYBERNETICS AND INFORMATION TECHNOLOGIES, SYSTEMS AND APPLICATIONS/INT CONF ON COMPUTING, COMMUNICATIONS AND CONTROL TECHNOLOGIES, VOL 1, 2007, : 7 - 12
  • [44] A novel extended secret image sharing scheme based on sharing matrix
    Li, Xiaopeng
    Fu, Zhengxin
    Yu, Bin
    [J]. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2024, 101
  • [45] Linear (k,n) secret sharing scheme with cheating detection
    Liu, Yanxiao
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (13) : 2115 - 2121
  • [46] A Simple and Efficient Secret Sharing Scheme Secure against Cheating
    Araki, Toshinori
    Ogata, Wakaha
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (06) : 1338 - 1345
  • [47] Linear (k, n) secret sharing scheme with cheating detection
    Liu, Yan-xiao
    Wang, Zhi-xiao
    Yan, Wen-yao
    [J]. CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 1943 - 1948
  • [48] An image secret sharing scheme with the capability of previvewing the secret image
    Yang, Ching-Nung
    Chen, Tse-Shih
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-5, 2007, : 1535 - 1538
  • [49] A hybrid scheme for enhancing recovered image quality in polynomial based secret image sharing by modify-and-recalculate strategy
    Wu, Xiaotian
    Yang, Ching-Nung
    Yang, Yi-Yun
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 51
  • [50] Two polynomials based (t, n) threshold secret sharing scheme with cheating detection
    Biswas, Anindya Kumar
    Dasgupta, Mou
    [J]. CRYPTOLOGIA, 2020, 44 (04) : 357 - 370