Verifiable Secret Sharing Scheme on Images using Watermarking

被引:0
|
作者
Roy, Chitradeep Dutta [1 ]
Choudhury, Neel [1 ]
Chatterjee, Amrik [2 ]
Adhikari, Avishek [3 ]
机构
[1] Univ Calcutta, Inst Engn & Management, Dept Comp Sci & Engn, Kolkata, W Bengal, India
[2] Univ Calcutta, Inst Engn & Management, Dept Informat Technol, Kolkata, W Bengal, India
[3] Univ Calcutta, Dept Pure Math, Kolkata, W Bengal, India
关键词
Secret Sharing; Lagrangian Interpolation; Watermarking; Share Authentication; Hash function; Symmetric key encryption;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we have implemented Adi Shamir's (k, n) threshold secret sharing scheme onto 24-bit bitmap images. Along with this we have used a concept of watermarking, hash function and a multilayered threshold secret sharing approach to verify the authenticity of each image share before processing instead of decrypting blindly. Moreover this verification scheme allows us to identify dishonest participants who might have gained unauthorized access on secret shares. Consequently, this proposed scheme offers a highly secure mechanism of image secret sharing, which is different from existing traditional methods. Although we have implemented this scheme on images it can easily be used on any digital format as we are dealing with streams of bits.
引用
收藏
页码:76 / 81
页数:6
相关论文
共 50 条
  • [41] A Lightweight Public Verifiable Multi Secret Sharing Scheme Using Short Integer Solution
    Dehkordi, Massoud Hadian
    Ghasemi, Reza
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2016, 91 (03) : 1459 - 1469
  • [42] Verifiable Quantum Secret Sharing Scheme Using d-dimensional GHZ State
    Bai, Chen-Ming
    Zhang, Sujuan
    Liu, Lu
    [J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2021, 60 (10) : 3993 - 4005
  • [43] A Hybrid-Based Verifiable Secret Sharing Scheme Using Chinese Remainder Theorem
    Verma, Om Prakash
    Jain, Nitin
    Pal, S. K.
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2020, 45 (04) : 2395 - 2406
  • [44] A Lightweight Public Verifiable Multi Secret Sharing Scheme Using Short Integer Solution
    Massoud Hadian Dehkordi
    Reza Ghasemi
    [J]. Wireless Personal Communications, 2016, 91 : 1459 - 1469
  • [45] Verifiable Quantum Secret Sharing Scheme Using d-dimensional GHZ State
    Chen-Ming Bai
    Sujuan Zhang
    Lu Liu
    [J]. International Journal of Theoretical Physics, 2021, 60 : 3993 - 4005
  • [46] Verifiable (t, n) Threshold Secret Sharing Scheme Using ECC Based Signcryption
    Basu, Atanu
    Sengupta, Indranil
    [J]. INFORMATION SYSTEMS, TECHNOLOGY AND MANAGEMENT, PROCEEDINGS, 2010, 54 : 133 - 144
  • [47] A Hybrid-Based Verifiable Secret Sharing Scheme Using Chinese Remainder Theorem
    Om Prakash Verma
    Nitin Jain
    S. K. Pal
    [J]. Arabian Journal for Science and Engineering, 2020, 45 : 2395 - 2406
  • [48] A reversible and authenticable secret sharing scheme using dual images
    Lin, Jiang-Yi
    Horng, Ji-Hwei
    Chang, Chin-Chen
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (13) : 17527 - 17545
  • [49] A reversible and authenticable secret sharing scheme using dual images
    Jiang-Yi Lin
    Ji-Hwei Horng
    Chin-Chen Chang
    [J]. Multimedia Tools and Applications, 2022, 81 : 17527 - 17545
  • [50] A novel secret sharing scheme using multiple share images
    Li, Xiaoping
    Liu, Yanjun
    Chen, Hefeng
    Chang, Chin-Chen
    [J]. MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2019, 16 (06) : 6350 - 6366