SlideShare a Scribd company logo
1 of 6
Download to read offline
Jung-San Lee, Pei-Yu Lin & Chin-Chen Chang
International Journal Of Image Processing (IJIP), Volume (4): Issue (4) 287
Analysis of an Image Secret Sharing Scheme to Identify
Cheaters
Jung-San Lee leejs@fcu.edu.tw
Department of Information Engineering and
Computer Science Feng Chia
UniversityTaichung, 40724,
Taiwan
Pei-Yu Lin pagelin3@gmail.com
Department of Information Communication
Yuan-Ze University Chung-li, 32003,
Taiwan
Chin-Chen Chang alan3c@gmail.com
Department of Information Engineering and
Computer Science Feng Chia University
Taichung, 40724, Taiwan
Abstract
Secret image sharing mechanisms have been widely applied to the military, e-
commerce, and communications fields. Zhao et al. introduced the concept of
cheater detection into image sharing schemes recently. This functionality enables
the image owner and authorized members to identify the cheater in
reconstructing the secret image. Here, we provide an analysis of Zhao et al.’s
method: an authorized participant is able to restore the secret image by
him/herself. This contradicts the requirement of secret image sharing schemes.
The authorized participant utilizes an exhaustive search to achieve the attempt,
though, simulation results show that it can be done within a reasonable time
period.
Keywords: Analysis, Secret image sharing, (t, n)-threshold, Cheater detection
1. INTRODUCTION
Shamir first introduced the concept of secret sharing in 1979 [10]. Given a set of participants P =
{P1, P2, …, Pn}, each of them possesses a secret shadow generated from the secret S. Hereafter,
any t out of n members can reveal S by collecting t secret shadows, i.e. (t, n)-threshold
mechanism. In such a system, participants with fewer than t shadows have no more knowledge of
the secret than the one with nothing. This can effectively enhance the security of communications
in an insecure network.
Engineers extend this concept to protect confidential images. Due to its practicability, secret
image sharing mechanisms have been widely applied to the military, e-commerce, and
communications fields [2, 3, 4, 5, 6, 8, 12, 13]. As illustrated in Fig. 1, in a (2, 5)-threshold
scheme, while delivering a secret image F-14 to five authorized members, an image owner
constructs several shadows from the original image in advance. Then, the owner issues each
Jung-San Lee, Pei-Yu Lin & Chin-Chen Chang
International Journal Of Image Processing (IJIP), Volume (4): Issue (4) 288
member a distinct shadow. No one who possesses fewer than two shadows can learn anything
about the secret image. Only when two authorized members provide their shadows can the
secret image be restored.
(a) the original secret image (b) shadow 1
(c) shadow 2 (d) shadow 3
(e) shadow 4 (f) shadow 5
(g) the reconstructed image
FIGURE 1: Secret image sharing: F-14
Recently, based on Thien and Lin’s method, Zhao et al. proposed a novel secret image sharing
scheme that introduces the concept of cheater identification [5, 7, 14]. This enables the image
owner and authorized members to detect the cheater while reconstructing the secret image. It is
claimed in [14] that their (t, n)- threshold method can confirm the following properties:
i. Involved participants can detect cheaters no matter who they are;
ii. At least t authorized participants can cooperate to reveal the secret image;
iii. Participants can join in recovering different original secret image as long as they possess
a secret shadow;
iv. No secure channel is needed between the image owner and authorized participants;
v. The size of shadow image is smaller than that of original secret image.
Unfortunately, we find that there exists a design weakness in Zhao et al.’s method: an authorized
participant is able to figure out a congruent number of the private key of the image owner using
the exhaustive search. Later, the participant can utilize this number to restore secret images
Jung-San Lee, Pei-Yu Lin & Chin-Chen Chang
International Journal Of Image Processing (IJIP), Volume (4): Issue (4) 289
simply; this contradicts Property ii. Employing the exhaustive search, though, experimental results
show that this can be done within a reasonable time period.
The rest of this article is organized as follows. We briefly introduce Zhao et al.’s mechanism in
Section 2. The design weakness of the method is proven in Section 3. We make conclusions in
Section4.
2. REVIEW OF AN IMAGE SECRET SHARING SCHEME TO IDENTIFY
CHEATERS
Zhao et al.’s method consists of three phases: initialization phase, construction phase, and
verification phase. Assume that P = {P1, P2, …,Pn} is the set of participants and any t out of n
participants can cooperate to recover the secret image. Details of these phases are described as
follows [14].
2.1 Initialization phase:
To begin with, the gray values of the secrete image from 251 to 255 shall be truncated to 250
since 251 is the greatest prime not larger than 255. The image owner O selects two large primes
( , )p q and computes N p q= × . O picks a generator
1/2
[ , ]g N N∈ and constructs an RSA-
based public and private key pair (e0, d0) satisfying 0 0
1mod ( )e d Nϕ× = . O publishes
0
( , , ) [9,11]e g N .
Each participant iP P∈ chooses a random number is ranged within [2, N] as its secret shadow.
Pi computes modis
i
g Nα = and proves it to O. O shall ensure i jα α≠ for i jP P≠ .
2.2 Construction phase:
Step 1: O computes 0 0
0
mod and mod , 1,2,..., .
d d
i i
g N N i nα β α= = = O publishes 0α .
Step 2: According to lexicography order, O divides the secret image I into several sections. For
each section k containing t pixels, O constructs a (t-1)th-degree polynomial as follows,
1
0 1 1
( ) ... mod 251,t
k t
f x a a x a x −
−
= + + + (1)
where 0 1 1, ,..., ta a a − are the t pixels of section k.
Step 3: O computes ( ),i k iy f β= (2)
for i = 1, 2, …, n, and publishes y1, y2, …, yn.
2.3 Verification phase:
Step 1: Pi utilizes its own secret shadow si to generate sub-secret 0.
mod .is
i
Nβ α=
Step 2: Anyone can verify iβ by checking whether 0
.
mod
e
i i
Nα β= holds or not. If it holds, iβ is
valid; otherwise, Pi may be a cheater.
Step 3: By collecting t pairs of ( iβ , yi)’s and the Lagrange interpolating polynomial, the
participants can determine a (t-1)th-degree polynomial as follows,
1 1,
1
0 1 1
( ) mod 251
... mod 251.
tt
i
k j
j i i j j i
t
t
x
f x y
a a x a x
β
β β= = ≠
−
−
−
=
−
= + + +
 
 
 
∑ ∏
Hence, the secret image I is restored.
Jung-San Lee, Pei-Yu Lin & Chin-Chen Chang
International Journal Of Image Processing (IJIP), Volume (4): Issue (4) 290
3. SECURITY ANALYSIS
In this section, we demonstrate that Zhao et al.’s (t, n)-threshold secret image sharing mechanism
does not comply with Property ii. We first describe the system scenario. O possesses two secret
images 1 2
and .I I iP keeps a secret shadow is and publishes modis
i
g Nα = . For
1,I according to Equation (1), O has to construct the polynomial
1
1 0 1 1( ) ... t
k tf x a a x a x −
−= + + + mod 251,
where 0 1 1, ,..., ta a a − are the t pixels of section k. Furthermore, O must compute
0
.
mod
d
i i
Nβ α= and publish 1 1
( ), for 1,2,..., .i k i
y f i nβ= =
By the same manner, O computes the following polynomial for I2:
1
2 0 1 1
( ) ... t
k t
f x b b x b x −
−
= + + + mod 251,
where 0 1 1, ,..., tb b b− are the t pixels of section k. Moreover, O computes and publishes
2 2
( ), for 1,2,..., ,i k i
y f i nβ= = according to Equation (2).
Assume that Pi has joined in recovering the secret image I1 and obtained the unique polynomial
1
1 0 1 1( ) ... t
k tf x a a x a x −
−= + + + mod 251. We employ the following proposition to show the design
weakness in [14].
Proposition: Pi can restore the secret image I2 by itself.
Proof: Applying i
β to 1
( )k
f x , Pi yields the following:
1
1 0 1 1
( mod 251) ... ( mod 251)mod 251t
i i t i
y a a aβ β −
−
= + + +
1
0 1 0 1 0
( mod 251) ... (( ) mod 251) mod 251i is s t
t
a a aα α −
−
= + + +
0 0 1
0 1 1
( mod 251) ... (( ) mod 251) mod 251
d d t
i t i
a a aα α −
−
= + + +
.
According to Fermat’s Theorem [11] and the equation 0
mod 251
d
i
α , Pi can fabricate 0d′
satisfying
0 0
d d′ = mod 250.
That is, 0
0 249.d′≤ ≤ Using the exhaustive search, Pi can find an 0d′ answering to
0
mod 251 mod 251
d
i i
α β
′
=
,
02 2
mod 251 mod 251
d
i i
α β
′
=
,
M
0( 1) ( 1)
mod 251 mod 251
t d t
i i
α β
′− −
=
.
For the section k in I2, Pi collects 12 22 2
, , , ,t
y y ... y and constructs
0 0 1
12 0 1 1 1 1
( mod 251) ... (( ) mod 251) mod 251,
d d t
t
y b b bα α
′ ′ −
−
′ ′ ′= + + +
0 0 1
22 0 1 2 1 2
( mod 251) ... (( ) mod 251)mod 251,
d d t
t
y b b bα α
′ ′ −
−
′ ′ ′= + + +
M
.251mod)251mod)((...)251mod( 1
1102
00 −′
−
′
′++′+′= td
tt
d
tt bbby αα
Since 0
d′ , 1 2
, ,..., and t
α α α are known to Pi, Pi can obtain the following system of equations.
1
12 0 1 1 1 1
... mod 251,t
t
y b b bδ δ −
−
′ ′ ′= + + +
Jung-San Lee, Pei-Yu Lin & Chin-Chen Chang
International Journal Of Image Processing (IJIP), Volume (4): Issue (4) 291
1
22 0 1 2 1 2
... mod 251,t
t
y b b bδ δ −
−
′ ′ ′= + + +
M
1
2 0 1 1
... mod 251,t
t t t t
y b b bδ δ −
−
′ ′ ′= + + +
where 0 0 0
1 1 2 2
mod 251, mod 251,..., mod 251.
d d d
t t
δ α δ α δ α
′ ′ ′
= = = Hence, Pi has the (t-1)th degree
Vandermonde matrix:














=
−
−
−
12
1
2
2
22
1
1
2
11
1
1
1
t
ttt
t
t
A
δδδ
δδδ
δδδ
L
MMMM
L
L
.
As i j
α α≠ , it implies i j
δ δ≠ , for 1,2,..., ,i n= and
1
det( ) ( ) 0j i
i j t
A δ δ
≤ ≤ ≤
= − ≠∏ .
That is, A is a non-singular matrix. Thus, Pi can obtain a unique solution
0 1 1
{ , ,..., }t
b b b −
′ ′ ′ = 0 1 1
{ , ,..., }t
b b b −
from the system of equations. Eventually, Pi is able to restore the
pixels of the secret image by itself. □
The proposition shows that Zhao et al.’s method violates Property ii. Even though Pi applies the
exhaustive search, this attempt can be completed in 250 tries at most. We conduct experiments
in the VC 6.0 language to confirm the feasibility of figuring out 0
d′ . Simulators were performed on
a PC with Intel L2300 CPU; the RSA algorithm was implemented according to the public
OpenSSL library [1]. Since
1/2
[ , ]g N N∈ , the input size is set to 1024 bits. The length of module
N is set to 256, 512, and 1024 bits, respectively. The running time of 250 tries is illustrated in
Table 1. It is clear that Pi is able to imitate 0
d′ within a very short time period under these cases.
Module length (bit)
256 512 1024
Running time
(second)
0.268151 0.411303 1.0416215
TABLE 1: Running Time under Different Module Length.
4. CONCLUSIONS
In this article, we have proven that an authorized participant can restore the secret image without
the help of others in Zhao et al.’s (t, n)-threshold. Even if the compromise has been done by the
exhaustive search, the simulation shows that it is completed within a rather short time interval.
ACKNOWLEDGMENT
This research is partially supported by the National Science Council, Taiwan, ROC,
under contract No. NSC 98-2218-E-035-001-MY3. The authors gratefully acknowledge
the anonymous reviewers for their valuable comments.
Jung-San Lee, Pei-Yu Lin & Chin-Chen Chang
International Journal Of Image Processing (IJIP), Volume (4): Issue (4) 292
5. REFERENCES
[1] The openSSL project, http://www.openssl.org
[2] T. S. Chen and C. C. Chang. “New method of secret image sharing based on vector
quantization”. Journal of Electronic Imaging, 10(4): 988-997, 2001
[3] C. C. Chang and R. J. Hwang. “Sharing secret images using shadow codebooks”.
Information Sciences, 335-345, 1998
[4] C. C. Chang, C. Y. Lin and C. S. Tseng. “Secret image hiding and sharing based on the (t, n)-
threshold”. Fundamenta Informaticae, 76(4): 399-411, 2007
[5] C. Thien and J. Lin. “Secret image sharing”. Computer & Graphics, 26(1): 765-770, 2002
[6] J. B. Feng, H. C. Wu, C. S. Tsai and Y. P. Chu. “A new multi-secret images sharing scheme
using Lagrange’s Interpolation”. The Journal of Systems and Software, 76: 327-339, 2005
[7] R. J. Hwang, W. B. Lee and C. C. Chang. “A concept of designing cheater identification
methods for secret sharing”. The Journal of Systems and Software, 46: 7-11, 1999
[8] R. Lukac and K. Plataniotis. “Colour image secret sharing”. Electronics Letters, 40(9): 529-
531, 2004
[9] R. Rivest, A. Shamir and L. Adleman. “A method for obtaining digital signatures and public
key cryptosystem”. Communications of the ACM, 21(2): 120-126, 1978
[10] A. Shamir. “How to share a secret”. Communications of the ACM, 22(11): 612-613, 1979
[11] W. Stallings. “Cryptography and Network Security – Principles and Practices”, Pearson
Education Inc., Fourth Edition, pp. 238-241 (2006)
[12] C. S. Tsai, C. C. Chang and T. S. Chen. “Sharing multiple secrets in digital images”. The
Journal of Systems and Software, 64(2): 163-170, 2002
[13] R. Wang and C. Su. “Secret image sharing with smaller shadow images”. Pattern
Recognition Letters, 27: 551-555, 2006
[14] R. Zhao, J. J. Zhao, F. Dai and F. Q. Zhao. “A new image secret sharing scheme to identify
cheaters”. Computer Standards & Interfaces, 31(1): 252-257, 2009

More Related Content

What's hot

Fractal Image Compression By Range Block Classification
Fractal Image Compression By Range Block ClassificationFractal Image Compression By Range Block Classification
Fractal Image Compression By Range Block ClassificationIRJET Journal
 
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...Editor IJCATR
 
A novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm forA novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm forprjpublications
 
211 738-1-pb
211 738-1-pb211 738-1-pb
211 738-1-pbishwari85
 
Question Paper Code 065 informatic Practice New CBSE - 2021
Question Paper Code 065 informatic Practice New CBSE - 2021 Question Paper Code 065 informatic Practice New CBSE - 2021
Question Paper Code 065 informatic Practice New CBSE - 2021 FarhanAhmade
 
Object Shape Representation by Kernel Density Feature Points Estimator
Object Shape Representation by Kernel Density Feature Points Estimator Object Shape Representation by Kernel Density Feature Points Estimator
Object Shape Representation by Kernel Density Feature Points Estimator cscpconf
 
D I G I T A L C O N T R O L S Y S T E M S J N T U M O D E L P A P E R{Www
D I G I T A L  C O N T R O L  S Y S T E M S  J N T U  M O D E L  P A P E R{WwwD I G I T A L  C O N T R O L  S Y S T E M S  J N T U  M O D E L  P A P E R{Www
D I G I T A L C O N T R O L S Y S T E M S J N T U M O D E L P A P E R{Wwwguest3f9c6b
 
MINIMIZING DISTORTION IN STEGANOG-RAPHY BASED ON IMAGE FEATURE
MINIMIZING DISTORTION IN STEGANOG-RAPHY BASED ON IMAGE FEATUREMINIMIZING DISTORTION IN STEGANOG-RAPHY BASED ON IMAGE FEATURE
MINIMIZING DISTORTION IN STEGANOG-RAPHY BASED ON IMAGE FEATUREijcsit
 
Digit recognizer by convolutional neural network
Digit recognizer by convolutional neural networkDigit recognizer by convolutional neural network
Digit recognizer by convolutional neural networkDing Li
 
Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...
Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...
Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...TELKOMNIKA JOURNAL
 
A NOVEL DATA ENCRYPTION TECHNIQUE BY GENETIC CROSSOVER OF ROBUST BIOMETRIC KE...
A NOVEL DATA ENCRYPTION TECHNIQUE BY GENETIC CROSSOVER OF ROBUST BIOMETRIC KE...A NOVEL DATA ENCRYPTION TECHNIQUE BY GENETIC CROSSOVER OF ROBUST BIOMETRIC KE...
A NOVEL DATA ENCRYPTION TECHNIQUE BY GENETIC CROSSOVER OF ROBUST BIOMETRIC KE...IJNSA Journal
 
Introduction to Neural Netwoks
Introduction to Neural Netwoks Introduction to Neural Netwoks
Introduction to Neural Netwoks Abdallah Bashir
 
Computer Vision: Visual Extent of an Object
Computer Vision: Visual Extent of an ObjectComputer Vision: Visual Extent of an Object
Computer Vision: Visual Extent of an ObjectIOSR Journals
 
Random Chaotic Number Generation based Clustered Image Encryption
Random Chaotic Number Generation based Clustered Image EncryptionRandom Chaotic Number Generation based Clustered Image Encryption
Random Chaotic Number Generation based Clustered Image EncryptionAM Publications
 
Lecture 3 image sampling and quantization
Lecture 3 image sampling and quantizationLecture 3 image sampling and quantization
Lecture 3 image sampling and quantizationVARUN KUMAR
 
New Approach of Preprocessing For Numeral Recognition
New Approach of Preprocessing For Numeral RecognitionNew Approach of Preprocessing For Numeral Recognition
New Approach of Preprocessing For Numeral RecognitionIJERA Editor
 
Implementation of ECC and ECDSA for Image Security
Implementation of ECC and ECDSA for Image SecurityImplementation of ECC and ECDSA for Image Security
Implementation of ECC and ECDSA for Image Securityrahulmonikasharma
 

What's hot (20)

Fractal Image Compression By Range Block Classification
Fractal Image Compression By Range Block ClassificationFractal Image Compression By Range Block Classification
Fractal Image Compression By Range Block Classification
 
5 1-10
5 1-105 1-10
5 1-10
 
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
 
A novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm forA novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm for
 
211 738-1-pb
211 738-1-pb211 738-1-pb
211 738-1-pb
 
G031201042047
G031201042047G031201042047
G031201042047
 
Question Paper Code 065 informatic Practice New CBSE - 2021
Question Paper Code 065 informatic Practice New CBSE - 2021 Question Paper Code 065 informatic Practice New CBSE - 2021
Question Paper Code 065 informatic Practice New CBSE - 2021
 
Object Shape Representation by Kernel Density Feature Points Estimator
Object Shape Representation by Kernel Density Feature Points Estimator Object Shape Representation by Kernel Density Feature Points Estimator
Object Shape Representation by Kernel Density Feature Points Estimator
 
Cc24529533
Cc24529533Cc24529533
Cc24529533
 
D I G I T A L C O N T R O L S Y S T E M S J N T U M O D E L P A P E R{Www
D I G I T A L  C O N T R O L  S Y S T E M S  J N T U  M O D E L  P A P E R{WwwD I G I T A L  C O N T R O L  S Y S T E M S  J N T U  M O D E L  P A P E R{Www
D I G I T A L C O N T R O L S Y S T E M S J N T U M O D E L P A P E R{Www
 
MINIMIZING DISTORTION IN STEGANOG-RAPHY BASED ON IMAGE FEATURE
MINIMIZING DISTORTION IN STEGANOG-RAPHY BASED ON IMAGE FEATUREMINIMIZING DISTORTION IN STEGANOG-RAPHY BASED ON IMAGE FEATURE
MINIMIZING DISTORTION IN STEGANOG-RAPHY BASED ON IMAGE FEATURE
 
Digit recognizer by convolutional neural network
Digit recognizer by convolutional neural networkDigit recognizer by convolutional neural network
Digit recognizer by convolutional neural network
 
Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...
Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...
Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...
 
A NOVEL DATA ENCRYPTION TECHNIQUE BY GENETIC CROSSOVER OF ROBUST BIOMETRIC KE...
A NOVEL DATA ENCRYPTION TECHNIQUE BY GENETIC CROSSOVER OF ROBUST BIOMETRIC KE...A NOVEL DATA ENCRYPTION TECHNIQUE BY GENETIC CROSSOVER OF ROBUST BIOMETRIC KE...
A NOVEL DATA ENCRYPTION TECHNIQUE BY GENETIC CROSSOVER OF ROBUST BIOMETRIC KE...
 
Introduction to Neural Netwoks
Introduction to Neural Netwoks Introduction to Neural Netwoks
Introduction to Neural Netwoks
 
Computer Vision: Visual Extent of an Object
Computer Vision: Visual Extent of an ObjectComputer Vision: Visual Extent of an Object
Computer Vision: Visual Extent of an Object
 
Random Chaotic Number Generation based Clustered Image Encryption
Random Chaotic Number Generation based Clustered Image EncryptionRandom Chaotic Number Generation based Clustered Image Encryption
Random Chaotic Number Generation based Clustered Image Encryption
 
Lecture 3 image sampling and quantization
Lecture 3 image sampling and quantizationLecture 3 image sampling and quantization
Lecture 3 image sampling and quantization
 
New Approach of Preprocessing For Numeral Recognition
New Approach of Preprocessing For Numeral RecognitionNew Approach of Preprocessing For Numeral Recognition
New Approach of Preprocessing For Numeral Recognition
 
Implementation of ECC and ECDSA for Image Security
Implementation of ECC and ECDSA for Image SecurityImplementation of ECC and ECDSA for Image Security
Implementation of ECC and ECDSA for Image Security
 

Viewers also liked

Caso de Sucesso WK - Mabber Indústria Têxtil
Caso de Sucesso WK - Mabber Indústria TêxtilCaso de Sucesso WK - Mabber Indústria Têxtil
Caso de Sucesso WK - Mabber Indústria TêxtilWK Sistemas
 
Leveraging Todoed for educational productivity - Rajath D M
Leveraging Todoed for educational productivity - Rajath D MLeveraging Todoed for educational productivity - Rajath D M
Leveraging Todoed for educational productivity - Rajath D MMahantesh Biradar
 
Greg Mitchell Resume
Greg Mitchell ResumeGreg Mitchell Resume
Greg Mitchell ResumeGreg Mitchell
 
Caso de Sucesso WK - Iguatemi Consultoria e Serviços de Engenharia
Caso de Sucesso WK - Iguatemi Consultoria e Serviços de EngenhariaCaso de Sucesso WK - Iguatemi Consultoria e Serviços de Engenharia
Caso de Sucesso WK - Iguatemi Consultoria e Serviços de EngenhariaWK Sistemas
 
Receitas massa express tupperware - Juliana Marchetti
Receitas massa express tupperware - Juliana MarchettiReceitas massa express tupperware - Juliana Marchetti
Receitas massa express tupperware - Juliana MarchettiJuliana Marchetti
 
ciri dan batas keterbukaan dalam penyelenggaraan pemerintah
ciri dan batas keterbukaan dalam penyelenggaraan pemerintahciri dan batas keterbukaan dalam penyelenggaraan pemerintah
ciri dan batas keterbukaan dalam penyelenggaraan pemerintahPark Isel
 
Multi-Level Secret Sharing Scheme for Mobile Ad-Hoc Networks
Multi-Level Secret Sharing Scheme for Mobile Ad-Hoc NetworksMulti-Level Secret Sharing Scheme for Mobile Ad-Hoc Networks
Multi-Level Secret Sharing Scheme for Mobile Ad-Hoc NetworksEswar Publications
 
Genesis de la natacion
Genesis de la natacionGenesis de la natacion
Genesis de la natacionCFyDnatacion
 
FOLLETO Antonio Palacios V. INGLES
 FOLLETO Antonio Palacios V. INGLES FOLLETO Antonio Palacios V. INGLES
FOLLETO Antonio Palacios V. INGLESMiriam Leiros
 

Viewers also liked (12)

Caso de Sucesso WK - Mabber Indústria Têxtil
Caso de Sucesso WK - Mabber Indústria TêxtilCaso de Sucesso WK - Mabber Indústria Têxtil
Caso de Sucesso WK - Mabber Indústria Têxtil
 
DQM_LandCamera_Manual
DQM_LandCamera_ManualDQM_LandCamera_Manual
DQM_LandCamera_Manual
 
Sujit-CV
Sujit-CVSujit-CV
Sujit-CV
 
Presentacion logistica express
Presentacion logistica expressPresentacion logistica express
Presentacion logistica express
 
Leveraging Todoed for educational productivity - Rajath D M
Leveraging Todoed for educational productivity - Rajath D MLeveraging Todoed for educational productivity - Rajath D M
Leveraging Todoed for educational productivity - Rajath D M
 
Greg Mitchell Resume
Greg Mitchell ResumeGreg Mitchell Resume
Greg Mitchell Resume
 
Caso de Sucesso WK - Iguatemi Consultoria e Serviços de Engenharia
Caso de Sucesso WK - Iguatemi Consultoria e Serviços de EngenhariaCaso de Sucesso WK - Iguatemi Consultoria e Serviços de Engenharia
Caso de Sucesso WK - Iguatemi Consultoria e Serviços de Engenharia
 
Receitas massa express tupperware - Juliana Marchetti
Receitas massa express tupperware - Juliana MarchettiReceitas massa express tupperware - Juliana Marchetti
Receitas massa express tupperware - Juliana Marchetti
 
ciri dan batas keterbukaan dalam penyelenggaraan pemerintah
ciri dan batas keterbukaan dalam penyelenggaraan pemerintahciri dan batas keterbukaan dalam penyelenggaraan pemerintah
ciri dan batas keterbukaan dalam penyelenggaraan pemerintah
 
Multi-Level Secret Sharing Scheme for Mobile Ad-Hoc Networks
Multi-Level Secret Sharing Scheme for Mobile Ad-Hoc NetworksMulti-Level Secret Sharing Scheme for Mobile Ad-Hoc Networks
Multi-Level Secret Sharing Scheme for Mobile Ad-Hoc Networks
 
Genesis de la natacion
Genesis de la natacionGenesis de la natacion
Genesis de la natacion
 
FOLLETO Antonio Palacios V. INGLES
 FOLLETO Antonio Palacios V. INGLES FOLLETO Antonio Palacios V. INGLES
FOLLETO Antonio Palacios V. INGLES
 

Similar to Analysis of an Image Secret Sharing Scheme to Identify Cheaters

A Beginner's Guide to Monocular Depth Estimation
A Beginner's Guide to Monocular Depth EstimationA Beginner's Guide to Monocular Depth Estimation
A Beginner's Guide to Monocular Depth EstimationRyo Takahashi
 
Week2- Deep Learning Intuition.pptx
Week2- Deep Learning Intuition.pptxWeek2- Deep Learning Intuition.pptx
Week2- Deep Learning Intuition.pptxfahmi324663
 
Detection and identification of cheaters in (t, n) secret
Detection and identification of cheaters in (t, n) secretDetection and identification of cheaters in (t, n) secret
Detection and identification of cheaters in (t, n) secretParag Tamhane
 
Image Quality Feature Based Detection Algorithm for Forgery in Images
Image Quality Feature Based Detection Algorithm for Forgery in Images  Image Quality Feature Based Detection Algorithm for Forgery in Images
Image Quality Feature Based Detection Algorithm for Forgery in Images ijcga
 
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...An Approach for Image Deblurring: Based on Sparse Representation and Regulari...
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...IRJET Journal
 
DeepXplore: Automated Whitebox Testing of Deep Learning
DeepXplore: Automated Whitebox Testing of Deep LearningDeepXplore: Automated Whitebox Testing of Deep Learning
DeepXplore: Automated Whitebox Testing of Deep LearningMasahiro Sakai
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptographyeSAT Publishing House
 
Fast Segmentation of Sub-cellular Organelles
Fast Segmentation of Sub-cellular OrganellesFast Segmentation of Sub-cellular Organelles
Fast Segmentation of Sub-cellular OrganellesCSCJournals
 
chAPTER1CV.pptx is abouter computer vision in artificial intelligence
chAPTER1CV.pptx is abouter computer vision in artificial intelligencechAPTER1CV.pptx is abouter computer vision in artificial intelligence
chAPTER1CV.pptx is abouter computer vision in artificial intelligenceshesnasuneer
 
computervision1.pptx its about computer vision
computervision1.pptx its about computer visioncomputervision1.pptx its about computer vision
computervision1.pptx its about computer visionshesnasuneer
 
Introduction to Machine Vision
Introduction to Machine VisionIntroduction to Machine Vision
Introduction to Machine VisionNasir Jumani
 
Data Steganography for Optical Color Image Cryptosystems
Data Steganography for Optical Color Image CryptosystemsData Steganography for Optical Color Image Cryptosystems
Data Steganography for Optical Color Image CryptosystemsCSCJournals
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsEswar Publications
 
A comparison between scilab inbuilt module and novel method for image fusion
A comparison between scilab inbuilt module and novel method for image fusionA comparison between scilab inbuilt module and novel method for image fusion
A comparison between scilab inbuilt module and novel method for image fusionEditor Jacotech
 
A NOVEL (K,N) SECRET SHARING SCHEME FROM QUADRATIC RESIDUES FOR GRAYSCALE IMAGES
A NOVEL (K,N) SECRET SHARING SCHEME FROM QUADRATIC RESIDUES FOR GRAYSCALE IMAGESA NOVEL (K,N) SECRET SHARING SCHEME FROM QUADRATIC RESIDUES FOR GRAYSCALE IMAGES
A NOVEL (K,N) SECRET SHARING SCHEME FROM QUADRATIC RESIDUES FOR GRAYSCALE IMAGESIJNSA Journal
 
Image Classification using Deep Learning
Image Classification using Deep LearningImage Classification using Deep Learning
Image Classification using Deep LearningIRJET Journal
 
Secret-Fragment-Visible Mosaic Image-Creation and Recovery via Colour Transfo...
Secret-Fragment-Visible Mosaic Image-Creation and Recovery via Colour Transfo...Secret-Fragment-Visible Mosaic Image-Creation and Recovery via Colour Transfo...
Secret-Fragment-Visible Mosaic Image-Creation and Recovery via Colour Transfo...IJSRD
 
A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...
A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...
A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...Editor IJCATR
 

Similar to Analysis of an Image Secret Sharing Scheme to Identify Cheaters (20)

A Beginner's Guide to Monocular Depth Estimation
A Beginner's Guide to Monocular Depth EstimationA Beginner's Guide to Monocular Depth Estimation
A Beginner's Guide to Monocular Depth Estimation
 
Week2- Deep Learning Intuition.pptx
Week2- Deep Learning Intuition.pptxWeek2- Deep Learning Intuition.pptx
Week2- Deep Learning Intuition.pptx
 
Detection and identification of cheaters in (t, n) secret
Detection and identification of cheaters in (t, n) secretDetection and identification of cheaters in (t, n) secret
Detection and identification of cheaters in (t, n) secret
 
Image Quality Feature Based Detection Algorithm for Forgery in Images
Image Quality Feature Based Detection Algorithm for Forgery in Images  Image Quality Feature Based Detection Algorithm for Forgery in Images
Image Quality Feature Based Detection Algorithm for Forgery in Images
 
R044068186
R044068186R044068186
R044068186
 
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...An Approach for Image Deblurring: Based on Sparse Representation and Regulari...
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...
 
DeepXplore: Automated Whitebox Testing of Deep Learning
DeepXplore: Automated Whitebox Testing of Deep LearningDeepXplore: Automated Whitebox Testing of Deep Learning
DeepXplore: Automated Whitebox Testing of Deep Learning
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
 
Fast Segmentation of Sub-cellular Organelles
Fast Segmentation of Sub-cellular OrganellesFast Segmentation of Sub-cellular Organelles
Fast Segmentation of Sub-cellular Organelles
 
chAPTER1CV.pptx is abouter computer vision in artificial intelligence
chAPTER1CV.pptx is abouter computer vision in artificial intelligencechAPTER1CV.pptx is abouter computer vision in artificial intelligence
chAPTER1CV.pptx is abouter computer vision in artificial intelligence
 
computervision1.pptx its about computer vision
computervision1.pptx its about computer visioncomputervision1.pptx its about computer vision
computervision1.pptx its about computer vision
 
Introduction to Machine Vision
Introduction to Machine VisionIntroduction to Machine Vision
Introduction to Machine Vision
 
Data Steganography for Optical Color Image Cryptosystems
Data Steganography for Optical Color Image CryptosystemsData Steganography for Optical Color Image Cryptosystems
Data Steganography for Optical Color Image Cryptosystems
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime Pixels
 
A comparison between scilab inbuilt module and novel method for image fusion
A comparison between scilab inbuilt module and novel method for image fusionA comparison between scilab inbuilt module and novel method for image fusion
A comparison between scilab inbuilt module and novel method for image fusion
 
A NOVEL (K,N) SECRET SHARING SCHEME FROM QUADRATIC RESIDUES FOR GRAYSCALE IMAGES
A NOVEL (K,N) SECRET SHARING SCHEME FROM QUADRATIC RESIDUES FOR GRAYSCALE IMAGESA NOVEL (K,N) SECRET SHARING SCHEME FROM QUADRATIC RESIDUES FOR GRAYSCALE IMAGES
A NOVEL (K,N) SECRET SHARING SCHEME FROM QUADRATIC RESIDUES FOR GRAYSCALE IMAGES
 
Image Classification using Deep Learning
Image Classification using Deep LearningImage Classification using Deep Learning
Image Classification using Deep Learning
 
Secret-Fragment-Visible Mosaic Image-Creation and Recovery via Colour Transfo...
Secret-Fragment-Visible Mosaic Image-Creation and Recovery via Colour Transfo...Secret-Fragment-Visible Mosaic Image-Creation and Recovery via Colour Transfo...
Secret-Fragment-Visible Mosaic Image-Creation and Recovery via Colour Transfo...
 
A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...
A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...
A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...
 
Security Enhancement of Image Encryption Based on Matrix Approach using Ellip...
Security Enhancement of Image Encryption Based on Matrix Approach using Ellip...Security Enhancement of Image Encryption Based on Matrix Approach using Ellip...
Security Enhancement of Image Encryption Based on Matrix Approach using Ellip...
 

Recently uploaded

CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 

Recently uploaded (20)

CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 

Analysis of an Image Secret Sharing Scheme to Identify Cheaters

  • 1. Jung-San Lee, Pei-Yu Lin & Chin-Chen Chang International Journal Of Image Processing (IJIP), Volume (4): Issue (4) 287 Analysis of an Image Secret Sharing Scheme to Identify Cheaters Jung-San Lee leejs@fcu.edu.tw Department of Information Engineering and Computer Science Feng Chia UniversityTaichung, 40724, Taiwan Pei-Yu Lin pagelin3@gmail.com Department of Information Communication Yuan-Ze University Chung-li, 32003, Taiwan Chin-Chen Chang alan3c@gmail.com Department of Information Engineering and Computer Science Feng Chia University Taichung, 40724, Taiwan Abstract Secret image sharing mechanisms have been widely applied to the military, e- commerce, and communications fields. Zhao et al. introduced the concept of cheater detection into image sharing schemes recently. This functionality enables the image owner and authorized members to identify the cheater in reconstructing the secret image. Here, we provide an analysis of Zhao et al.’s method: an authorized participant is able to restore the secret image by him/herself. This contradicts the requirement of secret image sharing schemes. The authorized participant utilizes an exhaustive search to achieve the attempt, though, simulation results show that it can be done within a reasonable time period. Keywords: Analysis, Secret image sharing, (t, n)-threshold, Cheater detection 1. INTRODUCTION Shamir first introduced the concept of secret sharing in 1979 [10]. Given a set of participants P = {P1, P2, …, Pn}, each of them possesses a secret shadow generated from the secret S. Hereafter, any t out of n members can reveal S by collecting t secret shadows, i.e. (t, n)-threshold mechanism. In such a system, participants with fewer than t shadows have no more knowledge of the secret than the one with nothing. This can effectively enhance the security of communications in an insecure network. Engineers extend this concept to protect confidential images. Due to its practicability, secret image sharing mechanisms have been widely applied to the military, e-commerce, and communications fields [2, 3, 4, 5, 6, 8, 12, 13]. As illustrated in Fig. 1, in a (2, 5)-threshold scheme, while delivering a secret image F-14 to five authorized members, an image owner constructs several shadows from the original image in advance. Then, the owner issues each
  • 2. Jung-San Lee, Pei-Yu Lin & Chin-Chen Chang International Journal Of Image Processing (IJIP), Volume (4): Issue (4) 288 member a distinct shadow. No one who possesses fewer than two shadows can learn anything about the secret image. Only when two authorized members provide their shadows can the secret image be restored. (a) the original secret image (b) shadow 1 (c) shadow 2 (d) shadow 3 (e) shadow 4 (f) shadow 5 (g) the reconstructed image FIGURE 1: Secret image sharing: F-14 Recently, based on Thien and Lin’s method, Zhao et al. proposed a novel secret image sharing scheme that introduces the concept of cheater identification [5, 7, 14]. This enables the image owner and authorized members to detect the cheater while reconstructing the secret image. It is claimed in [14] that their (t, n)- threshold method can confirm the following properties: i. Involved participants can detect cheaters no matter who they are; ii. At least t authorized participants can cooperate to reveal the secret image; iii. Participants can join in recovering different original secret image as long as they possess a secret shadow; iv. No secure channel is needed between the image owner and authorized participants; v. The size of shadow image is smaller than that of original secret image. Unfortunately, we find that there exists a design weakness in Zhao et al.’s method: an authorized participant is able to figure out a congruent number of the private key of the image owner using the exhaustive search. Later, the participant can utilize this number to restore secret images
  • 3. Jung-San Lee, Pei-Yu Lin & Chin-Chen Chang International Journal Of Image Processing (IJIP), Volume (4): Issue (4) 289 simply; this contradicts Property ii. Employing the exhaustive search, though, experimental results show that this can be done within a reasonable time period. The rest of this article is organized as follows. We briefly introduce Zhao et al.’s mechanism in Section 2. The design weakness of the method is proven in Section 3. We make conclusions in Section4. 2. REVIEW OF AN IMAGE SECRET SHARING SCHEME TO IDENTIFY CHEATERS Zhao et al.’s method consists of three phases: initialization phase, construction phase, and verification phase. Assume that P = {P1, P2, …,Pn} is the set of participants and any t out of n participants can cooperate to recover the secret image. Details of these phases are described as follows [14]. 2.1 Initialization phase: To begin with, the gray values of the secrete image from 251 to 255 shall be truncated to 250 since 251 is the greatest prime not larger than 255. The image owner O selects two large primes ( , )p q and computes N p q= × . O picks a generator 1/2 [ , ]g N N∈ and constructs an RSA- based public and private key pair (e0, d0) satisfying 0 0 1mod ( )e d Nϕ× = . O publishes 0 ( , , ) [9,11]e g N . Each participant iP P∈ chooses a random number is ranged within [2, N] as its secret shadow. Pi computes modis i g Nα = and proves it to O. O shall ensure i jα α≠ for i jP P≠ . 2.2 Construction phase: Step 1: O computes 0 0 0 mod and mod , 1,2,..., . d d i i g N N i nα β α= = = O publishes 0α . Step 2: According to lexicography order, O divides the secret image I into several sections. For each section k containing t pixels, O constructs a (t-1)th-degree polynomial as follows, 1 0 1 1 ( ) ... mod 251,t k t f x a a x a x − − = + + + (1) where 0 1 1, ,..., ta a a − are the t pixels of section k. Step 3: O computes ( ),i k iy f β= (2) for i = 1, 2, …, n, and publishes y1, y2, …, yn. 2.3 Verification phase: Step 1: Pi utilizes its own secret shadow si to generate sub-secret 0. mod .is i Nβ α= Step 2: Anyone can verify iβ by checking whether 0 . mod e i i Nα β= holds or not. If it holds, iβ is valid; otherwise, Pi may be a cheater. Step 3: By collecting t pairs of ( iβ , yi)’s and the Lagrange interpolating polynomial, the participants can determine a (t-1)th-degree polynomial as follows, 1 1, 1 0 1 1 ( ) mod 251 ... mod 251. tt i k j j i i j j i t t x f x y a a x a x β β β= = ≠ − − − = − = + + +       ∑ ∏ Hence, the secret image I is restored.
  • 4. Jung-San Lee, Pei-Yu Lin & Chin-Chen Chang International Journal Of Image Processing (IJIP), Volume (4): Issue (4) 290 3. SECURITY ANALYSIS In this section, we demonstrate that Zhao et al.’s (t, n)-threshold secret image sharing mechanism does not comply with Property ii. We first describe the system scenario. O possesses two secret images 1 2 and .I I iP keeps a secret shadow is and publishes modis i g Nα = . For 1,I according to Equation (1), O has to construct the polynomial 1 1 0 1 1( ) ... t k tf x a a x a x − −= + + + mod 251, where 0 1 1, ,..., ta a a − are the t pixels of section k. Furthermore, O must compute 0 . mod d i i Nβ α= and publish 1 1 ( ), for 1,2,..., .i k i y f i nβ= = By the same manner, O computes the following polynomial for I2: 1 2 0 1 1 ( ) ... t k t f x b b x b x − − = + + + mod 251, where 0 1 1, ,..., tb b b− are the t pixels of section k. Moreover, O computes and publishes 2 2 ( ), for 1,2,..., ,i k i y f i nβ= = according to Equation (2). Assume that Pi has joined in recovering the secret image I1 and obtained the unique polynomial 1 1 0 1 1( ) ... t k tf x a a x a x − −= + + + mod 251. We employ the following proposition to show the design weakness in [14]. Proposition: Pi can restore the secret image I2 by itself. Proof: Applying i β to 1 ( )k f x , Pi yields the following: 1 1 0 1 1 ( mod 251) ... ( mod 251)mod 251t i i t i y a a aβ β − − = + + + 1 0 1 0 1 0 ( mod 251) ... (( ) mod 251) mod 251i is s t t a a aα α − − = + + + 0 0 1 0 1 1 ( mod 251) ... (( ) mod 251) mod 251 d d t i t i a a aα α − − = + + + . According to Fermat’s Theorem [11] and the equation 0 mod 251 d i α , Pi can fabricate 0d′ satisfying 0 0 d d′ = mod 250. That is, 0 0 249.d′≤ ≤ Using the exhaustive search, Pi can find an 0d′ answering to 0 mod 251 mod 251 d i i α β ′ = , 02 2 mod 251 mod 251 d i i α β ′ = , M 0( 1) ( 1) mod 251 mod 251 t d t i i α β ′− − = . For the section k in I2, Pi collects 12 22 2 , , , ,t y y ... y and constructs 0 0 1 12 0 1 1 1 1 ( mod 251) ... (( ) mod 251) mod 251, d d t t y b b bα α ′ ′ − − ′ ′ ′= + + + 0 0 1 22 0 1 2 1 2 ( mod 251) ... (( ) mod 251)mod 251, d d t t y b b bα α ′ ′ − − ′ ′ ′= + + + M .251mod)251mod)((...)251mod( 1 1102 00 −′ − ′ ′++′+′= td tt d tt bbby αα Since 0 d′ , 1 2 , ,..., and t α α α are known to Pi, Pi can obtain the following system of equations. 1 12 0 1 1 1 1 ... mod 251,t t y b b bδ δ − − ′ ′ ′= + + +
  • 5. Jung-San Lee, Pei-Yu Lin & Chin-Chen Chang International Journal Of Image Processing (IJIP), Volume (4): Issue (4) 291 1 22 0 1 2 1 2 ... mod 251,t t y b b bδ δ − − ′ ′ ′= + + + M 1 2 0 1 1 ... mod 251,t t t t t y b b bδ δ − − ′ ′ ′= + + + where 0 0 0 1 1 2 2 mod 251, mod 251,..., mod 251. d d d t t δ α δ α δ α ′ ′ ′ = = = Hence, Pi has the (t-1)th degree Vandermonde matrix:               = − − − 12 1 2 2 22 1 1 2 11 1 1 1 t ttt t t A δδδ δδδ δδδ L MMMM L L . As i j α α≠ , it implies i j δ δ≠ , for 1,2,..., ,i n= and 1 det( ) ( ) 0j i i j t A δ δ ≤ ≤ ≤ = − ≠∏ . That is, A is a non-singular matrix. Thus, Pi can obtain a unique solution 0 1 1 { , ,..., }t b b b − ′ ′ ′ = 0 1 1 { , ,..., }t b b b − from the system of equations. Eventually, Pi is able to restore the pixels of the secret image by itself. □ The proposition shows that Zhao et al.’s method violates Property ii. Even though Pi applies the exhaustive search, this attempt can be completed in 250 tries at most. We conduct experiments in the VC 6.0 language to confirm the feasibility of figuring out 0 d′ . Simulators were performed on a PC with Intel L2300 CPU; the RSA algorithm was implemented according to the public OpenSSL library [1]. Since 1/2 [ , ]g N N∈ , the input size is set to 1024 bits. The length of module N is set to 256, 512, and 1024 bits, respectively. The running time of 250 tries is illustrated in Table 1. It is clear that Pi is able to imitate 0 d′ within a very short time period under these cases. Module length (bit) 256 512 1024 Running time (second) 0.268151 0.411303 1.0416215 TABLE 1: Running Time under Different Module Length. 4. CONCLUSIONS In this article, we have proven that an authorized participant can restore the secret image without the help of others in Zhao et al.’s (t, n)-threshold. Even if the compromise has been done by the exhaustive search, the simulation shows that it is completed within a rather short time interval. ACKNOWLEDGMENT This research is partially supported by the National Science Council, Taiwan, ROC, under contract No. NSC 98-2218-E-035-001-MY3. The authors gratefully acknowledge the anonymous reviewers for their valuable comments.
  • 6. Jung-San Lee, Pei-Yu Lin & Chin-Chen Chang International Journal Of Image Processing (IJIP), Volume (4): Issue (4) 292 5. REFERENCES [1] The openSSL project, http://www.openssl.org [2] T. S. Chen and C. C. Chang. “New method of secret image sharing based on vector quantization”. Journal of Electronic Imaging, 10(4): 988-997, 2001 [3] C. C. Chang and R. J. Hwang. “Sharing secret images using shadow codebooks”. Information Sciences, 335-345, 1998 [4] C. C. Chang, C. Y. Lin and C. S. Tseng. “Secret image hiding and sharing based on the (t, n)- threshold”. Fundamenta Informaticae, 76(4): 399-411, 2007 [5] C. Thien and J. Lin. “Secret image sharing”. Computer & Graphics, 26(1): 765-770, 2002 [6] J. B. Feng, H. C. Wu, C. S. Tsai and Y. P. Chu. “A new multi-secret images sharing scheme using Lagrange’s Interpolation”. The Journal of Systems and Software, 76: 327-339, 2005 [7] R. J. Hwang, W. B. Lee and C. C. Chang. “A concept of designing cheater identification methods for secret sharing”. The Journal of Systems and Software, 46: 7-11, 1999 [8] R. Lukac and K. Plataniotis. “Colour image secret sharing”. Electronics Letters, 40(9): 529- 531, 2004 [9] R. Rivest, A. Shamir and L. Adleman. “A method for obtaining digital signatures and public key cryptosystem”. Communications of the ACM, 21(2): 120-126, 1978 [10] A. Shamir. “How to share a secret”. Communications of the ACM, 22(11): 612-613, 1979 [11] W. Stallings. “Cryptography and Network Security – Principles and Practices”, Pearson Education Inc., Fourth Edition, pp. 238-241 (2006) [12] C. S. Tsai, C. C. Chang and T. S. Chen. “Sharing multiple secrets in digital images”. The Journal of Systems and Software, 64(2): 163-170, 2002 [13] R. Wang and C. Su. “Secret image sharing with smaller shadow images”. Pattern Recognition Letters, 27: 551-555, 2006 [14] R. Zhao, J. J. Zhao, F. Dai and F. Q. Zhao. “A new image secret sharing scheme to identify cheaters”. Computer Standards & Interfaces, 31(1): 252-257, 2009