Secret Image Sharing Based CTS with Cheating Detection
نویسندگان
چکیده
Cheque Truncation System(CTS) is an automatic cheque clearance system implemented by RBI.CTS uses cheque image, instead of the physical cheque itself, for cheque clearance thus reducing the turn around time drastically. This approach holds back the physical movement of cheque from presenting bank to the drawee bank. In CTS, digital image of the cheque is protected using standard public key and symmetric key encryptions like RSA, triple DES etc. This involves a lot of computation overhead and key management. The security also depends on the hard mathematical problem and is only computationally secure.Information theoretically secure, secret image sharing techniques can be used in the CTS for the secure and efficient processing of cheque image .In this paper, we propose two simple and efficient secret image sharing schemes and a Cheque Truncation System based on these algorithms . In the proposed scheme,the presenting bank is acting as the dealer and the participants are the customer, and the drawee bank.The dealer should generate the shares of cheque and distributes it to customer and drawee bank.The validity of the shares are important during the reconstruction process. The proposed scheme also suggests a method for cheating detection which identify any invalid shares submitted by the customers, using the hashing technique. The experimental results shows that the proposed scheme is efficient and secure compared with the existing scheme.
منابع مشابه
Security Analysis of a Hash-Based Secret Sharing Scheme
Secret sharing schemes perform an important role in protecting se-cret by sharing it among multiple participants. In 1979, (t; n) threshold secret sharing schemes were proposed by Shamir and Blakley independently. In a (t; n) threshold secret sharing scheme a secret can be shared among n partic-ipants such that t or more participants can reconstruct the secret, but it can not be reconstructed b...
متن کاملA Cheating Model for Cellular Automata-Based Secret Sharing Schemes
Cellular automata have been used for design of cryptosystems. Recently some secret sharing schemes based on linear memory cellular automata have been introduced which are used for both text and image. In this paper, we illustrate that these secret sharing schemes are vulnerable to dishonest participants’ collusion. We propose a cheating model for the secret sharing schemes based on linear memor...
متن کاملOn the Security of a Cheating Immune Visual Secret Sharing Scheme
Visual Secret Sharing (VSS), first invented by Naor and Shamir, is a variant of secret sharing. In the literature, VSS schemes have many applications, including visual authentication and identification, steganography, and image encryption. Moreover, VSS schemes provide the secure services in communications. In 2010, De Prisco and De Santis deeply discussed the problem of cheating in VSS, gave t...
متن کاملCheating Detection and Cheater Identification in CRT-based Secret Sharing Schemes
In this paper we analyze the cheating detection and cheater identification problems for the secret sharing schemes based on the Chinese remainder theorem (CRT ), more exactly for Mignotte [1] and Asmuth-Bloom [2] schemes. We prove that the majority of the solutions for Shamir’s scheme [3] can be translated to these schemes and, moreover, there are some interesting specific solutions.
متن کاملCheating Prevention in Linear Secret Sharing
Cheating detection in linear secret sharing is considered. The model of cheating extends the Tompa-Woll attack and includes cheating during multiple (unsuccessful) recovery of the secret. It is shown that shares in most linear schemes can be split into subshares. Subshares can be used by participants to trade perfectness of the scheme with cheating prevention. Evaluation of cheating prevention ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1502.07993 شماره
صفحات -
تاریخ انتشار 2015