DocumentCode :
181753
Title :
Cheating on a visual secret sharing scheme under a realistic scenario
Author :
Lumyong, P. ; Iwamoto, M. ; Ohta, K.
Author_Institution :
Dept. of Comput. Eng., King Mongkut´s Inst. of Technol. Ladkrabang, Bangkok, Thailand
fYear :
2014
fDate :
26-29 Oct. 2014
Firstpage :
575
Lastpage :
579
Abstract :
Cheating on a (2, n)-threshold visual secret sharing (VSS) schemes is discussed under a realistic scenario. Horng et al. pointed out an ordinary VSS scheme is vulnerable against a certain kind of cheating, and they proposed a countermeasure against it. In their work, so-called Kerckhoffs´s principle and availability of computing power are implicitly assumed in cheating detection. Namely, this work follows a scenario where a victim knows basis matrices and can use computational ability in cheating detection. Under this scenario, Horng et al. showed that their countermeasure attains negligible success probability of generating the victim´s share. However, recalling the fact that the decryption of VSS schemes does not depend on computations but depends on human visual system, we can naturally assume a realistic scenario where the victim does not know the basis matrices and has no computing power. Under this scenario, we show that the cheaters can make the victim recover an arbitrary forged secret image in Horng et al.´s countermeasure with probability 1.
Keywords :
cryptography; image coding; (2,n)-threshold visual secret sharing schemes; Kerckhoffs principle; VSS scheme decryption; arbitrary forged secret image; cheating detection; computational ability; computing power; human visual system; Australia; Cryptography; Hamming weight; Image color analysis; Image recognition; Stacking; Visualization;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Theory and its Applications (ISITA), 2014 International Symposium on
Conference_Location :
Melbourne, VIC
Type :
conf
Filename :
6979909
Link To Document :
بازگشت