期刊论文详细信息
Mathematical Biosciences and Engineering
Fake and dishonest participant location scheme in secret image sharing
Lei Sun1  Xuehu Yan1  Jingju Liu1  Jinrui Liu1 
[1] National University of Defense Technology, Hefei 230037, China;
关键词: secret image sharing;    visual secret sharing;    chinese remainder theorem;    shadow authentication;    high-efficiency shadows generation;   
DOI  :  10.3934/mbe.2021126
来源: DOAJ
【 摘 要 】

A (k,n) threshold secret image sharing (SIS) scheme divides a secret image into n shadows. One can reconstruct the secret image only when holding k or more than k shadows but cannot know any information on the secret from fewer than k shadows. Based on this characteristic, SIS has been widely used in access control, information hiding, distributed storage and other areas. Verifiable SIS aims to prevent malicious behaviour by attackers through verifying the authenticity of shadows and previous works did not solve this problem well. Our contribution is that we proposed a verifiable SIS scheme which combined CRT-based SIS and (2,n+1) threshold visual secret sharing(VSS). Our scheme is applicable no matter whether there exists a third party dealer. And it is worth mentioning that when the dealer is involved, our scheme can not only detect fake participants, but also locate dishonest participants. In general, loose screening criterion and efficient encoding and decoding rate of CRT-based SIS guarantee high-efficiency shadows generation and low recovery computation complexity. The uncertainty of the bits used for screening prevents malicious behavior by dishonest participants. In addition, our scheme has the advantages of lossless recovery, no pixel expansion and precise detection.

【 授权许可】

Unknown   

  文献评价指标  
  下载次数:0次 浏览次数:0次