Skip to main content

Cheating Prevention Using Genetic Feature Based Key in Secret Sharing Schemes

  • Conference paper
Security in Computing and Communications (SSCC 2014)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 467))

Included in the following conference series:

  • 1105 Accesses

Abstract

Shamir proposed a t out of n secret sharing scheme where secrets are encrypted into scrambled images called shares or shadows. The secrets can be reconstructed when t or more participants pool their shares or shadow images together. Major drawbacks in such schemes are if a forged share is pooled then it leads to reconstruction of wrong secret. Cheating is also possible by some participants who can deceive the remaining participants by pooling forged shares. Many cheating prevention schemes have been proposed which uses authentication bits, hash codes etc. This paper proposes a new biometric personal authentication technique which prevents the cheating of participants. The results of the system and the security analysis shows that the proposed scheme gives secret sharing participants the confidence of the recovered original secret without the need to worry about forging of shadow images or dishonest participants.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  2. Wang, R.Z., Su, C.H.: Secret image sharing with smaller shadow images. Pattern Recogn. Lett. 27, 551–555 (2006)

    Article  MathSciNet  Google Scholar 

  3. Chang, C.C., Hsieh, Y.P.: Sharing secrets in stego images with authentication. Pattern Recogn. 41, 3130–3137 (2008)

    Article  MATH  Google Scholar 

  4. Lin, C.C., Tsai, W.H.: Secret Image sharing with steganography and authentication. J. Syst. Software 73, 405–414 (2004)

    Article  Google Scholar 

  5. Wu, Y.S., Thien, C.C., Lin, J.C.: Sharing and hiding secret images with size constraint. Pattern Recogn. Lett. 37, 1377–1385 (2004)

    Article  Google Scholar 

  6. Thien, C.C., Lin, J.C.: Secret Image sharing. Comput. Graphics 26(1), 765–770 (2002)

    Article  Google Scholar 

  7. Lin, P.L., Chan, C.S.: Invertible secret image sharing with steganography. Pattern Recogn. Lett. 31, 1887–1893 (2010)

    Article  MathSciNet  Google Scholar 

  8. Chen, Y.C., Tsai, D.S., Hong, G.: A new authentication based cheating prevention scheme in Noar Shamir’s visual cryptography. J. Vis. Commun. Image R. 21, 900–916 (2010)

    Article  Google Scholar 

  9. Lin, P.U., Lee, J.S., Chang, C.C.: Distortion free secret image sharing mechanism using modulus operator. Pattern Recogn. 42, 886–895 (2009)

    Article  MATH  Google Scholar 

  10. Ulutas, M., Ulutas, G., Nabiyev, V.V.: Medical Image Security and EPR hiding using Shamir’s secret sharing scheme. J. Syst. Software 84, 341–353 (2011)

    Article  Google Scholar 

  11. Anbarasi, L.J., Kannan, S.: Secured Secret Color Image Sharing With Steganography. In: IEEE International Conference on Recent Trends in Information Technology, pp. 44–48 (2012)

    Google Scholar 

  12. Yang, C.C., Chang, T.Y., Hwang, M.S.: A (t, n) multi-secret sharing scheme. Appl. Math. Comput. 151(2), 483–490 (2004)

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Anbarasi, L.J., Narendra, M., Mala, G.S.A. (2014). Cheating Prevention Using Genetic Feature Based Key in Secret Sharing Schemes. In: Mauri, J.L., Thampi, S.M., Rawat, D.B., Jin, D. (eds) Security in Computing and Communications. SSCC 2014. Communications in Computer and Information Science, vol 467. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-44966-0_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-44966-0_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-44965-3

  • Online ISBN: 978-3-662-44966-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics