On the Feasibility and Security of Image Secret Sharing Scheme to Identify Cheaters

Zhao et al. (A new image secret sharing scheme to identify cheaters, Com- puter Standards & Interfaces, vol.31, no.1, pp.252 − 257, 2009) proposed a (t, n) thresh- old image secret sharing scheme to identify cheaters. The scheme is based on Thien- Lin scheme and the intractability of discrete logarithm. It allows honest participants to identify cheaters, and each participant only needs to save her/his own secret shadow. Unfortunately, their scheme has a serious feasibility problem, and is insecure for image sharing. In this paper, the feasibility and security of the scheme are analyzed. It is proved that the scheme may be infeasible with probability 1 − 251!=(251 n (251 − n)!). This prob- ability increases with larger value of n, and reaches 96:26% when n is equal to 40. We also prove that the scheme is easy to crack when it is suffered from a brute force attack, especially when t is a small integer. The main weaknesses of feasibility and security are proved and shown by theoretical analysis and some experiments.

[1]  Ja-Chen Lin,et al.  Sharing and hiding secret images with size constraint , 2004, Pattern Recognit..

[2]  Chang-Chou Lin,et al.  Visual cryptography for gray-level images by dithering techniques , 2003, Pattern Recognit. Lett..

[3]  Yôiti Suzuki,et al.  Reinforcement of VoIP Security with Multipath Routing and Secret Sharing Scheme , 2010, J. Inf. Hiding Multim. Signal Process..

[4]  Chin-Chen Chang,et al.  Sharing a Secret Image in Binary Images with Verification , 2011, J. Inf. Hiding Multim. Signal Process..

[5]  Underwood Dudley Elementary Number Theory , 1978 .

[6]  Chin-Chen Chang,et al.  A User-Friendly Image Sharing Scheme Using JPEG-LS Median Edge Predictor , 2012, J. Inf. Hiding Multim. Signal Process..

[7]  Ching-Nung Yang,et al.  Colored visual cryptography scheme based on additive color mixing , 2008, Pattern Recognit..

[8]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[9]  Jen-Bang Feng,et al.  A new multi-secret images sharing scheme using Largrange's interpolation , 2005, J. Syst. Softw..

[10]  Chiang-Lung Liu,et al.  High-performance JPEG steganography using complementary embedding strategy , 2008, Pattern Recognit..

[11]  Mei-Yi Wu,et al.  An iterative method of palette-based image steganography , 2004, Pattern Recognit. Lett..

[12]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[13]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[14]  David Burton Elementary Number Theory , 1976 .

[15]  Zengqiang Chen,et al.  Image encryption based on a new total shuffling algorithm , 2008 .

[16]  Jen-Bang Feng,et al.  Visual secret sharing for multiple secrets , 2008, Pattern Recognit..

[17]  Rong Zhao,et al.  A new image secret sharing scheme to identify cheaters , 2009, Comput. Stand. Interfaces.

[18]  Z. Guan,et al.  Chaos-based image encryption algorithm ✩ , 2005 .

[19]  Vinod Patidar,et al.  Image encryption using chaotic logistic map , 2006, Image Vis. Comput..

[20]  Ja-Chen Lin,et al.  Secret image sharing , 2002, Comput. Graph..