Skip navigation

Please use this identifier to cite or link to this item: http://10.10.120.238:8080/xmlui/handle/123456789/130
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBhat K.en_US
dc.contributor.authorJinwala D.en_US
dc.contributor.authorPrasad Y.en_US
dc.contributor.authorZaveri M.en_US
dc.date.accessioned2023-11-30T07:33:27Z-
dc.date.available2023-11-30T07:33:27Z-
dc.date.issued2023-
dc.identifier.isbn978-1450397926-
dc.identifier.otherEID(2-s2.0-85152237789)-
dc.identifier.urihttps://dx.doi.org/10.1145/3582177.3582192-
dc.identifier.urihttp://localhost:8080/xmlui/handle/123456789/130-
dc.description.abstractSeveral (k, n) Secret Image Sharing (SIS) schemes supporting authentication of reconstructed secret image and that of shares are proposed in the past. In these existing schemes, two similar state-of-the-art SIS schemes performing visual based share authentication have following merits compared to other schemes: no restriction on values of k and n to be 2, linear time complexity of share authentication, lossless secret image reconstruction, no pixel expansion, and support for share authentication in both dealer participatory and non-participatory environments. In this paper, we show that respective share authentication in these two similar state-of-the-art SIS schemes is computationally insecure in malicious model. We first identify the vulnerabilities in their respective share authentication through security analysis. Then, we propose two linear time algorithms for generating invalid shares from original shares by exploiting the identified vulnerabilities. These generated invalid shares are capable of passing respective authentication in the two analyzed SIS schemes. In addition, usage of a generated invalid share in place of original share during secret image reconstruction results in distorted secret image. Finally, we provide experimental results that accord with inferences of security analysis and linear time complexity of the proposed algorithms for invalid shares generation. © 2023 ACM.en_US
dc.language.isoenen_US
dc.publisherAssociation for Computing Machineryen_US
dc.sourceACM International Conference Proceeding Seriesen_US
dc.subjectImage securityen_US
dc.subjectSecret image sharingen_US
dc.subjectShare authenticationen_US
dc.titleSecurity Analysis of Visual based Share Authentication and Algorithms for Invalid Shares Generation in Malicious Modelen_US
dc.typeConference Paperen_US
Appears in Collections:Conference Paper

Files in This Item:
There are no files associated with this item.
Show simple item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.