International Journal of Image Processing | |
Analysis of an Image Secret Sharing Scheme to Identify Cheaters | |
Pei-Yu Lin1  Chin-Chen Chang1  Jung-San LEe1  | |
[1] $$ | |
关键词: steganography; bmp image; hide data; | |
DOI : | |
来源: Computer Science Journals | |
【 摘 要 】
Secret image sharing mechanisms have been widely applied to the military, e-commerce, and communications fields. Zhao et al. introduced the concept of cheater detection into image sharing schemes recently. This functionality enables the image owner and authorized members to identify the cheater in reconstructing the secret image. Here, we provide an analysis of Zhao et al.¡¦s method: an authorized participant is able to restore the secret image by him/herself. This contradicts the requirement of secret image sharing schemes. The authorized participant utilizes an exhaustive search to achieve the attempt, though, simulation results show that it can be done within a reasonable time period.
【 授权许可】
Unknown
【 预 览 】
Files | Size | Format | View |
---|---|---|---|
RO201912040511129ZK.pdf | 326KB | download |