A Method for Verifiable Secret Image Sharing

Автор: Priya Venny, Jyoti Rao

Журнал: International Journal of Computer Network and Information Security(IJCNIS) @ijcnis

Статья в выпуске: 5 vol.9, 2017 года.

Бесплатный доступ

Secret Image Sharing using Verifiable method has become an important field in cryptography in today's world. Security is of main concern and verifiability has become a demand of this era in order to avoid cheating prevention and a new scheme of secret image sharing scheme for identification of the presence of cheater is has been analyzed and described. A method for ensuring integrity of secret image prior to its recovery is proposed. An secret image and verification image are used to create shares by ARGB to CMYK conversions which are sent via cover image for transmission. The shares created are meaningful therefore this method is able of identifying whether cheater exists or not in order to preserve the integrity of the image.

Еще

Cheating Prevention, Secret Sharing, Visual Cryptography, Verification Image, Secret Image, RGB, CMYK, LSB

Короткий адрес: https://sciup.org/15011849

IDR: 15011849

Список литературы A Method for Verifiable Secret Image Sharing

  • M. Naor and A. Shamir, Visual cryptography, Lecture Notes Computer Science, vol. 50, pp. 1-12, 1995.
  • Mary, G. Germine, and M. Mary Shanthi Rani. "A Study on Secret Image Hiding in Diverse Color Spaces."
  • Chen, Yu-Chi, Du-Shiau Tsai, and Gwoboa Horng. "Visual secret sharing with cheating prevention revisited." Digital Signal Processing 23.5 (2013): 1496-1504.
  • Tan, Xiaoqing, and Qiong Zhang. "A Kind of Verifiable Visual Cryptography Scheme." Emerging Intelligent Data and Web Technologies (EIDWT), 2013 Fourth International Conference on. IEEE, 2013.
  • Rao, Jyoti, and Priya Venny. "A new approach of Secret Image Sharing using Verifiable scheme." Computing, Communication and Automation (ICCCA), 2016 International Conference on. IEEE, 2016.
  • Rose, A. Angel, and Sabu M. Thampi. "A Secure Verifiable Scheme for Secret Image Sharing." Procedia Computer Science 58 (2015): 140-150.
  • Jana, Biswabandhu, et al. "Cheating prevention in Visual Cryptographic Schemes using message embedding: A hardware based practical approach."Issues and Challenges in Intelligent Computing Techniques (ICICT), 2014 International Conference on. IEEE, 2014.
  • Besteena, K. J., and Philumon Joseph. "Reversible data hiding in selectively encrypted RGB images by reserving room in advance." Computational Systems and Communications (ICCSC), 2014 First International Conference on. IEEE, 2014.
  • Jana, Biswabandhu, et al. "Cheating prevention in Visual Cryptographic Schemes using message embedding: A hardware based practical approach."Issues and Challenges in Intelligent Computing Techniques (ICICT), 2014 International Conference on. IEEE, 2014.
  • https://www.scribd.com/doc/54600936/Steganography-Report.
  • Vijayalakshmi, V., G. Zayaraz, and V. Nagaraj. "A modulo based LSB steganography method." Control, Automation, Communication and Energy Conservation, 2009. INCACEC 2009. 2009 International Conference on. IEEE, 2009.
Еще
Статья научная