Applying cheating identifiable secret sharing scheme in multimedia security

被引:4
|
作者
Ma, Zheng [1 ,2 ]
Ma, Yan [1 ]
Huang, Xiaohong [1 ]
Zhang, Manjun [2 ]
Liu, Yanxiao [3 ]
机构
[1] Beijing Univ Posts & Telecommun, Beijing, Peoples R China
[2] China Unicom Network Technol Res Inst, Beijing, Peoples R China
[3] Xian Univ Technol, Xian 710048, Peoples R China
基金
国家重点研发计划;
关键词
Multimedia security; Secret image sharing; Secret sharing; Cheating identification; STEGANOGRAPHY;
D O I
10.1186/s13640-020-00529-z
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In (k,n) secret sharing scheme, one secret is encrypted intonshares in such a way that onlykor more shares can decrypt the secret. Secret sharing scheme can be extended into the field of multimedia that provides an efficient way to protect confidential information on multimedia. Secret image sharing is just the most important extension of secret sharing that can safely guard the secrecy of images among multiple participants. On the other hand, cheating detection is an important issue in traditional secret sharing schemes that have been discussed for many years. However, the issue of cheating detection in secret image sharing has not been discussed sufficiently. In this paper, we consider the cheating problem in the application of secret image sharing schemes and construct a (k,n) secret image sharing scheme with the ability of cheating detection and identification. Our scheme is capable of identifying cheaters whenkparticipants involve in reconstruction. The cheating identification ability and size of shadow in the proposed scheme are improved from the previous cheating identifiable secret image sharing scheme.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Applying cheating identifiable secret sharing scheme in multimedia security
    Zheng Ma
    Yan Ma
    Xiaohong Huang
    Manjun Zhang
    Yanxiao Liu
    [J]. EURASIP Journal on Image and Video Processing, 2020
  • [2] Cheating identifiable polynomial based secret sharing scheme for audio and image
    Prashanti, Guttikonda
    Bhat, Mundukur Nirupama
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (1) : 403 - 423
  • [3] Cheating identifiable secret sharing scheme using symmetric bivariate polynomial
    Liu, Yanxiao
    Yang, Chingnung
    Wang, Yichuan
    Zhu, Lei
    Ji, Wenjiang
    [J]. INFORMATION SCIENCES, 2018, 453 : 21 - 29
  • [4] Cheating identifiable polynomial based secret sharing scheme for audio and image
    Guttikonda Prashanti
    Mundukur Nirupama Bhat
    [J]. Multimedia Tools and Applications, 2024, 83 : 403 - 423
  • [5] Cheating identifiable (k, n) threshold quantum secret sharing scheme
    Chenhong Yan
    Zhihui Li
    Lu Liu
    Dianjun Lu
    [J]. Quantum Information Processing, 2022, 21
  • [6] Cheating identifiable (k, n) threshold quantum secret sharing scheme
    Yan, Chenhong
    Li, Zhihui
    Liu, Lu
    Lu, Dianjun
    [J]. QUANTUM INFORMATION PROCESSING, 2022, 21 (01)
  • [7] Cheater identifiable visual secret sharing scheme
    Gan Zhi & Chen Kefei1. Computer Science Department
    [J]. Journal of Systems Engineering and Electronics, 2005, (01) : 233 - 236
  • [8] A Scheme of Rational Secret Sharing against Cheating
    Cai, Yongquan
    Shi, Huili
    [J]. PROCEEDINGS OF INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY (ISCSCT 2009), 2009, : 166 - 169
  • [9] A Scheme of Rational Secret Sharing Against Cheating
    Cai Yong-quan
    Shi Hui-li
    [J]. INTERNATIONAL CONFERENCE OF CHINA COMMUNICATION (ICCC2010), 2010, : 60 - 64
  • [10] Secret Sharing Scheme with Efficient Cheating Detection
    Becerra, Daniel
    Vega, Gerardo
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON NETWORKING, INFORMATION SYSTEMS & SECURITY (NISS19), 2019,