DocumentCode
181753
Title
Cheating on a visual secret sharing scheme under a realistic scenario
Author
Lumyong, P. ; Iwamoto, M. ; Ohta, K.
Author_Institution
Dept. of Comput. Eng., King Mongkut´s Inst. of Technol. Ladkrabang, Bangkok, Thailand
fYear
2014
fDate
26-29 Oct. 2014
Firstpage
575
Lastpage
579
Abstract
Cheating on a (2, n)-threshold visual secret sharing (VSS) schemes is discussed under a realistic scenario. Horng et al. pointed out an ordinary VSS scheme is vulnerable against a certain kind of cheating, and they proposed a countermeasure against it. In their work, so-called Kerckhoffs´s principle and availability of computing power are implicitly assumed in cheating detection. Namely, this work follows a scenario where a victim knows basis matrices and can use computational ability in cheating detection. Under this scenario, Horng et al. showed that their countermeasure attains negligible success probability of generating the victim´s share. However, recalling the fact that the decryption of VSS schemes does not depend on computations but depends on human visual system, we can naturally assume a realistic scenario where the victim does not know the basis matrices and has no computing power. Under this scenario, we show that the cheaters can make the victim recover an arbitrary forged secret image in Horng et al.´s countermeasure with probability 1.
Keywords
cryptography; image coding; (2,n)-threshold visual secret sharing schemes; Kerckhoffs principle; VSS scheme decryption; arbitrary forged secret image; cheating detection; computational ability; computing power; human visual system; Australia; Cryptography; Hamming weight; Image color analysis; Image recognition; Stacking; Visualization;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Theory and its Applications (ISITA), 2014 International Symposium on
Conference_Location
Melbourne, VIC
Type
conf
Filename
6979909
Link To Document