{"title":"图像秘密共享与识别作弊者","authors":"Sonali D. Patil, P. Deshmukh","doi":"10.1109/ICAETR.2014.7012837","DOIUrl":null,"url":null,"abstract":"This paper is an extension of (t, n) threshold secret sharing scheme based on Matrix Projection. The proposed scheme achieves publicly verifiable image secret sharing with identification of cheaters. The added functionality uses asymmetric key algorithm to identify the cheaters. The scheme can identify up to n number of cheaters. The experimental results show that proposed scheme is accurate, secure and with small size of shares than the original secret image.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":" 13","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Image secret sharing with identification of cheaters\",\"authors\":\"Sonali D. Patil, P. Deshmukh\",\"doi\":\"10.1109/ICAETR.2014.7012837\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper is an extension of (t, n) threshold secret sharing scheme based on Matrix Projection. The proposed scheme achieves publicly verifiable image secret sharing with identification of cheaters. The added functionality uses asymmetric key algorithm to identify the cheaters. The scheme can identify up to n number of cheaters. The experimental results show that proposed scheme is accurate, secure and with small size of shares than the original secret image.\",\"PeriodicalId\":196504,\"journal\":{\"name\":\"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)\",\"volume\":\" 13\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAETR.2014.7012837\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAETR.2014.7012837","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Image secret sharing with identification of cheaters
This paper is an extension of (t, n) threshold secret sharing scheme based on Matrix Projection. The proposed scheme achieves publicly verifiable image secret sharing with identification of cheaters. The added functionality uses asymmetric key algorithm to identify the cheaters. The scheme can identify up to n number of cheaters. The experimental results show that proposed scheme is accurate, secure and with small size of shares than the original secret image.