Share Email Print

Journal of Electronic Imaging

Tamper-proof secret image-sharing scheme for identifying cheated secret keys and shared images
Author(s): Chien-Chang Chen; Chong-An Liu Liu
Format Member Price Non-Member Price
PDF $20.00 $25.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

A (t,n) secret image-sharing scheme shares a secret image to n participants, and the t users recover the image. During the recovery procedure of a conventional secret image-sharing scheme, cheaters may use counterfeit secret keys or modified shared images to cheat other users’ secret keys and shared images. A cheated secret key or shared image leads to an incorrect secret image. Unfortunately, the cheater cannot be identified. We present an exponent and modulus-based scheme to provide a tamper-proof secret image-sharing scheme for identifying cheaters on secret keys or shared images. The proposed scheme allows users to securely select their secret key. This assignment can be performed over networks. Modulus results of each shared image is calculated to recognize cheaters of a shared image. Experimental results indicate that the proposed scheme is excellent at identifying cheated secret keys and shared images.

Paper Details

Date Published: 9 January 2013
PDF: 7 pages
J. Electron. Imag. 22(1) 013008 doi: 10.1117/1.JEI.22.1.013008
Published in: Journal of Electronic Imaging Volume 22, Issue 1
Show Author Affiliations
Chien-Chang Chen, Tamkang Univ. (Taiwan)
Chong-An Liu Liu, Tamkang Univ. (Taiwan)

© SPIE. Terms of Use
Back to Top