Verifiable Secret Sharing Scheme on Images using Watermarking

被引:0
|
作者
Roy, Chitradeep Dutta [1 ]
Choudhury, Neel [1 ]
Chatterjee, Amrik [2 ]
Adhikari, Avishek [3 ]
机构
[1] Univ Calcutta, Inst Engn & Management, Dept Comp Sci & Engn, Kolkata, W Bengal, India
[2] Univ Calcutta, Inst Engn & Management, Dept Informat Technol, Kolkata, W Bengal, India
[3] Univ Calcutta, Dept Pure Math, Kolkata, W Bengal, India
关键词
Secret Sharing; Lagrangian Interpolation; Watermarking; Share Authentication; Hash function; Symmetric key encryption;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we have implemented Adi Shamir's (k, n) threshold secret sharing scheme onto 24-bit bitmap images. Along with this we have used a concept of watermarking, hash function and a multilayered threshold secret sharing approach to verify the authenticity of each image share before processing instead of decrypting blindly. Moreover this verification scheme allows us to identify dishonest participants who might have gained unauthorized access on secret shares. Consequently, this proposed scheme offers a highly secure mechanism of image secret sharing, which is different from existing traditional methods. Although we have implemented this scheme on images it can easily be used on any digital format as we are dealing with streams of bits.
引用
收藏
页码:76 / 81
页数:6
相关论文
共 50 条
  • [1] Verifiable Image Secret Sharing in Matrix Projection Using Watermarking
    Patil, Sonali
    Deshmukh, Prashant
    [J]. 2014 INTERNATIONAL CONFERENCE ON CIRCUITS, SYSTEMS, COMMUNICATION AND INFORMATION TECHNOLOGY APPLICATIONS (CSCITA), 2014, : 225 - 229
  • [2] Verifiable Secret Sharing Scheme Using Hash Values
    Imai, Junta
    Mimura, Mamoru
    Tanaka, Hidema
    [J]. 2018 SIXTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING WORKSHOPS (CANDARW 2018), 2018, : 405 - 409
  • [3] A new approach of Secret Image Sharing using Verifiable Scheme
    Rao, Jyoti
    Venny, Priya
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 1134 - 1139
  • [4] Verifiable XOR-based visual secret sharing scheme for hyperspectral images
    Srujana, Oruganti Sai
    Mhala, Nikhil C.
    Pais, Alwyn R.
    [J]. JOURNAL OF APPLIED REMOTE SENSING, 2021, 15 (01)
  • [5] A VERIFIABLE MULTI-SECRET SHARING SCHEME
    Wang, Yong
    Zhu, Yanqin
    Luo, Xizhao
    [J]. INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY, PROCEEDINGS, 2009, : 136 - 138
  • [6] A New, Publicly Verifiable, Secret Sharing Scheme
    Behnad, A.
    Eghlidos, T.
    [J]. SCIENTIA IRANICA, 2008, 15 (02) : 246 - 251
  • [7] A quantum secret sharing scheme with verifiable function
    Li-Juan Liu
    Zhi-Hui Li
    Zhao-Wei Han
    Dan-Li Zhi
    [J]. The European Physical Journal D, 2020, 74
  • [8] A quantum secret sharing scheme with verifiable function
    Liu, Li-Juan
    Li, Zhi-Hui
    Han, Zhao-Wei
    Zhi, Dan-Li
    [J]. EUROPEAN PHYSICAL JOURNAL D, 2020, 74 (07):
  • [9] A Secure Verifiable Scheme for Secret Image Sharing
    Rose, Angel A.
    Thampi, Sabu M.
    [J]. SECOND INTERNATIONAL SYMPOSIUM ON COMPUTER VISION AND THE INTERNET (VISIONNET'15), 2015, 58 : 140 - 150
  • [10] Random Grid and Reversible Watermarking-Based On Verifiable Secret Sharing for Outsourcing Images in Cloud
    Gao, Hang
    Hu, Mengting
    Gao, Tiegang
    Cheng, Renhong
    [J]. INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2018, 10 (01) : 24 - 39