CFP last date
20 January 2025
Reseach Article

An Optimal Secret Message based Image Sharing Method to Avoid Cheater in Message Reconstruction

by Preeti Rahangdale, Yogendra Kumar Jain
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 116 - Number 6
Year of Publication: 2015
Authors: Preeti Rahangdale, Yogendra Kumar Jain
10.5120/20343-2197

Preeti Rahangdale, Yogendra Kumar Jain . An Optimal Secret Message based Image Sharing Method to Avoid Cheater in Message Reconstruction. International Journal of Computer Applications. 116, 6 ( April 2015), 34-39. DOI=10.5120/20343-2197

@article{ 10.5120/20343-2197,
author = { Preeti Rahangdale, Yogendra Kumar Jain },
title = { An Optimal Secret Message based Image Sharing Method to Avoid Cheater in Message Reconstruction },
journal = { International Journal of Computer Applications },
issue_date = { April 2015 },
volume = { 116 },
number = { 6 },
month = { April },
year = { 2015 },
issn = { 0975-8887 },
pages = { 34-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume116/number6/20343-2197/ },
doi = { 10.5120/20343-2197 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:56:23.391565+05:30
%A Preeti Rahangdale
%A Yogendra Kumar Jain
%T An Optimal Secret Message based Image Sharing Method to Avoid Cheater in Message Reconstruction
%J International Journal of Computer Applications
%@ 0975-8887
%V 116
%N 6
%P 34-39
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Multimedia confidential data uses internet communication channel for transmission. It is not very safe to transmit data via internet communication channel. So it is desired to secure the data before transmitting. Recently various algorithms have been proposed in this context. But there is problem of wrong reconstruction due to fake player participation. To overcome this problem, the proposed method presents an optimal approach for secret sharing. Proposed approach totally depends upon threshold. A secret image can be split into N small sub-files and combination of any T sub-files the original file can be recovered without errors.

References
  1. Blakley, G. R. , "Safeguarding cryptographic key", Proc. AFIPS National Computer Conf. , vol. 48, pp. 313–317, 1979.
  2. Shamir, A. , "How to share a secret", Commun. ACM, vol. 22, no. (11), pp. 612–613, 1979.
  3. Hu, C. M. , Tzeng, W. G. , "Cheating prevention in visual cryptography", IEEE Trans. Image Process, vol. 16, no. (1), pp. 36–45, 2007.
  4. Zhao, R. , Zhao, J. J. , Dai, F. , Zhao, F. Q. , "A new image secret sharing scheme to identify cheaters", Comput. Stand. Interfaces, vol. 31, no. (1), pp. 252–257, 2009.
  5. Abhishek Parakh and Subhash Kak, "Recursive Secret Sharing for Distributed Storage and Information Hiding", ACM Proceedings of the 3rd international conference on Advanced networks and telecommunication systems, pp 88-90, 2009.
  6. Moo-Ryong Ra, Ramesh Govindan and Antonio Ortega, "P3: Toward Privacy-Preserving Photo Sharing" 10th USENIX Symposium on Networked Systems Design and Implementation, pp 515-528, 2013.
  7. Anbarasi, L. J. and Kannan, S. , " Secured secret color image sharing with steganography", IEEE 2012, pp 44 – 48, 2012.
  8. Ming-Chun Chien and Hwang, J. G. , "Secret image sharing using (t,n) threshold scheme with lossless recovery", IEEE, pp 1325 – 1329, 2012.
  9. Wei-Kuei Chen, "Image sharing method for gray-level images", The Journal of Systems and Software 86, Elsevier, pp 581–585, 2013.
  10. Ching -Nung Yang, Tse-Shih Chen, "Improvements of image sharing with steganography and authentication" Journal of Systems and Software Elsevier, vol. 80, pp 1070–1076, 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Secret image Secret sharing Share building Share distribution Secret share reconstruction