CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Secure and Verifiable Multi Secret Sharing Scheme for Encrypting Two Secret Images into Two Shares

by Shubhangi Khairnar, Reena Kharat
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 134 - Number 11
Year of Publication: 2016
Authors: Shubhangi Khairnar, Reena Kharat
10.5120/ijca2016908101

Shubhangi Khairnar, Reena Kharat . A Secure and Verifiable Multi Secret Sharing Scheme for Encrypting Two Secret Images into Two Shares. International Journal of Computer Applications. 134, 11 ( January 2016), 27-29. DOI=10.5120/ijca2016908101

@article{ 10.5120/ijca2016908101,
author = { Shubhangi Khairnar, Reena Kharat },
title = { A Secure and Verifiable Multi Secret Sharing Scheme for Encrypting Two Secret Images into Two Shares },
journal = { International Journal of Computer Applications },
issue_date = { January 2016 },
volume = { 134 },
number = { 11 },
month = { January },
year = { 2016 },
issn = { 0975-8887 },
pages = { 27-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume134/number11/23959-2016908101/ },
doi = { 10.5120/ijca2016908101 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:33:57.052475+05:30
%A Shubhangi Khairnar
%A Reena Kharat
%T A Secure and Verifiable Multi Secret Sharing Scheme for Encrypting Two Secret Images into Two Shares
%J International Journal of Computer Applications
%@ 0975-8887
%V 134
%N 11
%P 27-29
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Data, information and image security is very important in now days. Data and image encryption is a method for preventing misuse of attackers. Because encryption and decryption is important to securely protect data. Visual cryptography is a technique which is beneficial for defense and security. In the old technique; two secret images convert into halftone image and transmit these images using two shares and stacking these two shares revel the secret images. One drawback of this scheme is can’t verify the shares are original or fake. In this paper use the verifiable secret sharing using steganography technique to verify the shares. Proposed scheme can verify the share using steganography and then use XOR visual cryptography for share generation, by using this scheme preventing the misuse of adversaries.

References
  1. G.R. Blakley, “Safeguarding cryptography keys,” In Proceedings of AFIPS 1979 National Computer Conference,Volume. 48, pp.313-317,New York, USA, 1979.
  2. M. Noar, A. Shamir, “Visual cryptography,” in: A. De Santis (Ed.),Advance in Cryptography: Eurpocrypt’94, Lecture Notes in Computer Science, Volume. 950, pp. 1-12, 1955.
  3. E. Verheul, H.V. Tilborg, “Constructions and properties of k out of n visual secret sharing schemes,” Designs, Codes and Cryptography, pp.179–196, 1997.
  4. D. Wang, L. Zhang, N. Ma, X. Li, “Two secret sharing schemes based on Boolean operations, “In Proceedings of Pattern Recognition. Published by Elsevier Science Ltd, pp. 2776-2785, 2007.
  5. C.C. Wu, L.H. Chen, “A Study On Visual Cryptography”, Master Thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R.O.C., 1998.
  6. C. C. Chang, J. C. Chuang, Pei-Yu Lin , “Sharing A Secret Two-Tone Image In Two Gray-Level Images”, Proceedings of the 11th International Conference on Parallel and Distributed Systems (ICPADS'05) , 2005.
  7. Duanhao Ou a , Wei Sun b,c,n , Xiaotian Wu ,“A Non expansible XOR based visual cryptography scheme with meaningful shares”, 0165-1684 2014 Elsevier BV. All rights reserved.
  8. Rezvan Dastanian and Hadi Shahriar Shahhoseini ,“ Multi Secret Sharing Scheme for Encrypting Two Secret Images into Two Shares”, 2011 International Conference on Information and Electronics Engineering IPCSIT vol.6 (2011) © (2011) IACSIT Press, Singapore
  9. Tzung-Her Chen, Kai-Hsiang Tsao, and Kuo-Chen Wei, “Multi-Secrets Visual Secret Sharing”, Proceedings of APCC 2008, IEICE, 2008.
Index Terms

Computer Science
Information Sciences

Keywords

Visual Cryptography Halftone Technology Multi Secret Sharing steganography.