SSCC 2014: Security in Computing and Communications pp 111-119 | Cite as
Cheating Prevention Using Genetic Feature Based Key in Secret Sharing Schemes
Abstract
Shamir proposed a t out of n secret sharing scheme where secrets are encrypted into scrambled images called shares or shadows. The secrets can be reconstructed when t or more participants pool their shares or shadow images together. Major drawbacks in such schemes are if a forged share is pooled then it leads to reconstruction of wrong secret. Cheating is also possible by some participants who can deceive the remaining participants by pooling forged shares. Many cheating prevention schemes have been proposed which uses authentication bits, hash codes etc. This paper proposes a new biometric personal authentication technique which prevents the cheating of participants. The results of the system and the security analysis shows that the proposed scheme gives secret sharing participants the confidence of the recovered original secret without the need to worry about forging of shadow images or dishonest participants.
Keywords
Image Processing Threshold Secret Sharing BiometricsPreview
Unable to display preview. Download preview PDF.
References
- 1.Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)CrossRefGoogle Scholar
- 2.Wang, R.Z., Su, C.H.: Secret image sharing with smaller shadow images. Pattern Recogn. Lett. 27, 551–555 (2006)CrossRefMathSciNetGoogle Scholar
- 3.Chang, C.C., Hsieh, Y.P.: Sharing secrets in stego images with authentication. Pattern Recogn. 41, 3130–3137 (2008)CrossRefMATHGoogle Scholar
- 4.Lin, C.C., Tsai, W.H.: Secret Image sharing with steganography and authentication. J. Syst. Software 73, 405–414 (2004)CrossRefGoogle Scholar
- 5.Wu, Y.S., Thien, C.C., Lin, J.C.: Sharing and hiding secret images with size constraint. Pattern Recogn. Lett. 37, 1377–1385 (2004)CrossRefGoogle Scholar
- 6.Thien, C.C., Lin, J.C.: Secret Image sharing. Comput. Graphics 26(1), 765–770 (2002)CrossRefGoogle Scholar
- 7.Lin, P.L., Chan, C.S.: Invertible secret image sharing with steganography. Pattern Recogn. Lett. 31, 1887–1893 (2010)CrossRefMathSciNetGoogle Scholar
- 8.Chen, Y.C., Tsai, D.S., Hong, G.: A new authentication based cheating prevention scheme in Noar Shamir’s visual cryptography. J. Vis. Commun. Image R. 21, 900–916 (2010)CrossRefGoogle Scholar
- 9.Lin, P.U., Lee, J.S., Chang, C.C.: Distortion free secret image sharing mechanism using modulus operator. Pattern Recogn. 42, 886–895 (2009)CrossRefMATHGoogle Scholar
- 10.Ulutas, M., Ulutas, G., Nabiyev, V.V.: Medical Image Security and EPR hiding using Shamir’s secret sharing scheme. J. Syst. Software 84, 341–353 (2011)CrossRefGoogle Scholar
- 11.Anbarasi, L.J., Kannan, S.: Secured Secret Color Image Sharing With Steganography. In: IEEE International Conference on Recent Trends in Information Technology, pp. 44–48 (2012)Google Scholar
- 12.Yang, C.C., Chang, T.Y., Hwang, M.S.: A (t, n) multi-secret sharing scheme. Appl. Math. Comput. 151(2), 483–490 (2004)CrossRefMATHMathSciNetGoogle Scholar