TY - JOUR
T1 - Verifiable Image Secret Sharing Using Matrix Projection
AU - Azzahra, N. F.
AU - Ariyanti, Kiki
N1 - Publisher Copyright:
© Published under licence by IOP Publishing Ltd.
PY - 2018/12/4
Y1 - 2018/12/4
N2 - Secret sharing scheme is a technique to share secret data into n pieces based on a simple (k, n) threshold scheme. However, the problem with Shamir's secret sharing scheme is that they do not provide any way to verify that the dealer was honest and the shares were indeed valid. This problem also occurr in the Thien and Lin's image secret sharing or the Li Bai's construction using matrix projection. On the other hand, a developed protocol for secret sharing called verifiable secret sharing allows every participant to validate their received piece to confirm the authenticity of the secret. Therefore, this paper discussed a proposed scheme based on verifiable secret sharing, in which the matrix projection is used to create image shares and a public matrix from watermark image. The secrets were represented in elements of a square matrix. The watermark image was used for verifiability where the reconstructed watermark image verifies the accuracy of the reconstructed secret image.
AB - Secret sharing scheme is a technique to share secret data into n pieces based on a simple (k, n) threshold scheme. However, the problem with Shamir's secret sharing scheme is that they do not provide any way to verify that the dealer was honest and the shares were indeed valid. This problem also occurr in the Thien and Lin's image secret sharing or the Li Bai's construction using matrix projection. On the other hand, a developed protocol for secret sharing called verifiable secret sharing allows every participant to validate their received piece to confirm the authenticity of the secret. Therefore, this paper discussed a proposed scheme based on verifiable secret sharing, in which the matrix projection is used to create image shares and a public matrix from watermark image. The secrets were represented in elements of a square matrix. The watermark image was used for verifiability where the reconstructed watermark image verifies the accuracy of the reconstructed secret image.
UR - http://www.scopus.com/inward/record.url?scp=85058315635&partnerID=8YFLogxK
U2 - 10.1088/1742-6596/1108/1/012082
DO - 10.1088/1742-6596/1108/1/012082
M3 - Conference article
AN - SCOPUS:85058315635
SN - 1742-6588
VL - 1108
JO - Journal of Physics: Conference Series
JF - Journal of Physics: Conference Series
IS - 1
M1 - 012082
T2 - 2nd Mathematics, Informatics, Science and Education International Conference, MISEIC 2018
Y2 - 21 July 2018
ER -