http://10.10.120.238:8080/xmlui/handle/123456789/130
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Bhat K. | en_US |
dc.contributor.author | Jinwala D. | en_US |
dc.contributor.author | Prasad Y. | en_US |
dc.contributor.author | Zaveri M. | en_US |
dc.date.accessioned | 2023-11-30T07:33:27Z | - |
dc.date.available | 2023-11-30T07:33:27Z | - |
dc.date.issued | 2023 | - |
dc.identifier.isbn | 978-1450397926 | - |
dc.identifier.other | EID(2-s2.0-85152237789) | - |
dc.identifier.uri | https://dx.doi.org/10.1145/3582177.3582192 | - |
dc.identifier.uri | http://localhost:8080/xmlui/handle/123456789/130 | - |
dc.description.abstract | Several (k, n) Secret Image Sharing (SIS) schemes supporting authentication of reconstructed secret image and that of shares are proposed in the past. In these existing schemes, two similar state-of-the-art SIS schemes performing visual based share authentication have following merits compared to other schemes: no restriction on values of k and n to be 2, linear time complexity of share authentication, lossless secret image reconstruction, no pixel expansion, and support for share authentication in both dealer participatory and non-participatory environments. In this paper, we show that respective share authentication in these two similar state-of-the-art SIS schemes is computationally insecure in malicious model. We first identify the vulnerabilities in their respective share authentication through security analysis. Then, we propose two linear time algorithms for generating invalid shares from original shares by exploiting the identified vulnerabilities. These generated invalid shares are capable of passing respective authentication in the two analyzed SIS schemes. In addition, usage of a generated invalid share in place of original share during secret image reconstruction results in distorted secret image. Finally, we provide experimental results that accord with inferences of security analysis and linear time complexity of the proposed algorithms for invalid shares generation. © 2023 ACM. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Association for Computing Machinery | en_US |
dc.source | ACM International Conference Proceeding Series | en_US |
dc.subject | Image security | en_US |
dc.subject | Secret image sharing | en_US |
dc.subject | Share authentication | en_US |
dc.title | Security Analysis of Visual based Share Authentication and Algorithms for Invalid Shares Generation in Malicious Model | en_US |
dc.type | Conference Paper | en_US |
Appears in Collections: | Conference Paper |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.