Abstract
Shamir proposed a t out of n secret sharing scheme where secrets are encrypted into scrambled images called shares or shadows. The secrets can be reconstructed when t or more participants pool their shares or shadow images together. Major drawbacks in such schemes are if a forged share is pooled then it leads to reconstruction of wrong secret. Cheating is also possible by some participants who can deceive the remaining participants by pooling forged shares. Many cheating prevention schemes have been proposed which uses authentication bits, hash codes etc. This paper proposes a new biometric personal authentication technique which prevents the cheating of participants. The results of the system and the security analysis shows that the proposed scheme gives secret sharing participants the confidence of the recovered original secret without the need to worry about forging of shadow images or dishonest participants.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)
Wang, R.Z., Su, C.H.: Secret image sharing with smaller shadow images. Pattern Recogn. Lett. 27, 551–555 (2006)
Chang, C.C., Hsieh, Y.P.: Sharing secrets in stego images with authentication. Pattern Recogn. 41, 3130–3137 (2008)
Lin, C.C., Tsai, W.H.: Secret Image sharing with steganography and authentication. J. Syst. Software 73, 405–414 (2004)
Wu, Y.S., Thien, C.C., Lin, J.C.: Sharing and hiding secret images with size constraint. Pattern Recogn. Lett. 37, 1377–1385 (2004)
Thien, C.C., Lin, J.C.: Secret Image sharing. Comput. Graphics 26(1), 765–770 (2002)
Lin, P.L., Chan, C.S.: Invertible secret image sharing with steganography. Pattern Recogn. Lett. 31, 1887–1893 (2010)
Chen, Y.C., Tsai, D.S., Hong, G.: A new authentication based cheating prevention scheme in Noar Shamir’s visual cryptography. J. Vis. Commun. Image R. 21, 900–916 (2010)
Lin, P.U., Lee, J.S., Chang, C.C.: Distortion free secret image sharing mechanism using modulus operator. Pattern Recogn. 42, 886–895 (2009)
Ulutas, M., Ulutas, G., Nabiyev, V.V.: Medical Image Security and EPR hiding using Shamir’s secret sharing scheme. J. Syst. Software 84, 341–353 (2011)
Anbarasi, L.J., Kannan, S.: Secured Secret Color Image Sharing With Steganography. In: IEEE International Conference on Recent Trends in Information Technology, pp. 44–48 (2012)
Yang, C.C., Chang, T.Y., Hwang, M.S.: A (t, n) multi-secret sharing scheme. Appl. Math. Comput. 151(2), 483–490 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Anbarasi, L.J., Narendra, M., Mala, G.S.A. (2014). Cheating Prevention Using Genetic Feature Based Key in Secret Sharing Schemes. In: Mauri, J.L., Thampi, S.M., Rawat, D.B., Jin, D. (eds) Security in Computing and Communications. SSCC 2014. Communications in Computer and Information Science, vol 467. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-44966-0_11
Download citation
DOI: https://doi.org/10.1007/978-3-662-44966-0_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-44965-3
Online ISBN: 978-3-662-44966-0
eBook Packages: Computer ScienceComputer Science (R0)