Applying cheating identifiable secret sharing scheme in multimedia security

In ( k , n ) secret sharing scheme, one secret is encrypted into n shares in such a way that only k or more shares can decrypt the secret. Secret sharing scheme can be extended into the field of multimedia that provides an efficient way to protect confidential information on multimedia. Secret image sharing is just the most important extension of secret sharing that can safely guard the secrecy of images among multiple participants. On the other hand, cheating detection is an important issue in traditional secret sharing schemes that have been discussed for many years. However, the issue of cheating detection in secret image sharing has not been discussed sufficiently. In this paper, we consider the cheating problem in the application of secret image sharing schemes and construct a ( k , n ) secret image sharing scheme with the ability of cheating detection and identification. Our scheme is capable of identifying cheaters when k participants involve in reconstruction. The cheating identification ability and size of shadow in the proposed scheme are improved from the previous cheating identifiable secret image sharing scheme.

[1]  Ching-Nung Yang,et al.  Improvements of image sharing with steganography and authentication , 2007, J. Syst. Softw..

[2]  Yi-Cheng Chen,et al.  (k, N) Scalable Secret Image Sharing with Multiple Decoding Options , 2020, J. Intell. Fuzzy Syst..

[3]  YangChing-Nung,et al.  $k$ Out of $n$ Region Incrementing Scheme in Visual Cryptography , 2012 .

[4]  Satoshi Obana,et al.  Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution , 2006, ASIACRYPT.

[5]  Chin-Chen Chang,et al.  Cheating resistance and reversibility-oriented secret sharing mechanism , 2011, IET Inf. Secur..

[6]  Ching-Nung Yang,et al.  Region-in-Region Incrementing Visual Cryptography Scheme , 2012, IWDW.

[7]  Ching-Nung Yang,et al.  Steganography and authentication in image sharing without parity bits , 2012 .

[8]  Ching-Nung Yang,et al.  (k,n) secret image sharing scheme capable of cheating detection , 2018, EURASIP J. Wirel. Commun. Netw..

[9]  Ching-Nung Yang,et al.  Threshold changeable secret image sharing scheme based on interpolation polynomial , 2019, Multimedia Tools and Applications.

[10]  Mark G. Karpovsky,et al.  Design of Reliable and Secure Devices Realizing Shamir's Secret Sharing , 2016, IEEE Transactions on Computers.

[11]  Martin Tompa,et al.  How to share a secret with cheaters , 1988, Journal of Cryptology.

[12]  Ja-Chen Lin,et al.  Secret image sharing , 2002, Comput. Graph..

[13]  Kaoru Kurosawa,et al.  Optimum Secret Sharing Scheme Secure against Cheating , 1996, EUROCRYPT.

[14]  Ran-Zan Wang,et al.  Region Incrementing Visual Cryptography , 2009, IEEE Signal Processing Letters.

[15]  Chang-Chou Lin,et al.  Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..

[16]  Ching-Nung Yang,et al.  Thresholds Based Image Extraction Schemes in Big Data Environment in Intelligent Traffic Management , 2021, IEEE Transactions on Intelligent Transportation Systems.

[17]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[18]  Lein Harn,et al.  Detection and identification of cheaters in (t, n) secret sharing scheme , 2009, Des. Codes Cryptogr..

[19]  Ching-Nung Yang,et al.  $k$ Out of $n$ Region Incrementing Scheme in Visual Cryptography , 2012, IEEE Trans. Circuits Syst. Video Technol..

[20]  Satoshi Obana Almost Optimum t-Cheater Identifiable Secret Sharing Schemes , 2011, EUROCRYPT.

[21]  Chin-Chen Chang,et al.  Sharing secrets in stego images with authentication , 2008, Pattern Recognit..