..............................
..............................
..............................
Verifiable Multi Secret Sharing Scheme for 3D
An efficient, computationally secure, verifiable (t , n) multi secret sharing scheme, based on YCH is p roposed for
multiple 3D models. The (t, n) scheme shares the 3D secrets among n participants, such that shares less than t cannot reveal
the secret. The experimental results provide suffic ient protection to 3D models. The feasibility and t he security of the proposed
system are demonstrated on various 3D models. The s imulation results show that the secrets are retrieved from the shares
without any loss
[1] Blakley G., Safeguarding Cryptographic Keys, in Proceedings of AFIPS National Computer Conference , New York, USA, pp. 313F317, 1979.
[2] Chang C., Hsieh Y., and Lin C., Sharing Secrets in Stego Images with Authentication, Pattern Recognition , vol. 41, no. 10, pp. 3130F3137, 2008.
[3] Esam E. and Ben H., Secret sharing Approaches for 3D Object Encryption, Expert Systems with Applications , vol. 38, no. 11, pp. 13906F13911, 2011.
[4] Feng J., Wu H., Tsai C., Chang Y., and Chu Y., Visual Secret Sharing For Multiple Secrets, Pattern Recognition , vol. 41, no. 12, pp. 3572F 3581, 2008.
[5] Guzin U., Mustafa U., and Vasif N., Distortion Free Geometry Based Secret Image Sharing, Procedia Computer Science , vol. 3, pp. 721F726, 2011.
[6] Khan B., Alghathbar K., Khan M., Alkelabi A., and Alajaji A., Cyber Security Using Arabic CAPTCHA Scheme, the International Arab Journal of Information Technology , vol. 10, no. 1, pp. 76F84, 2013.
[7] Lin C. and Tsai W., Secret Image Sharing with Steganography and Authentication, Journal of Systems and Software , vol. 73, no. 3, pp. 405F 414, 2004.
[8] Lin S. and Lin J., VCPSS: A TwoFinFOne Two DecodingFOptions Image Sharing Method Combining Visual Cryptography (VC) and PolynomialFStyle Sharing (PSS) Approaches, Pattern Recognation , vol. 40, no. 12, pp. 3652F 3666, 2007. Verifiable Multi Secret Sharing Scheme for 3D Models 713
[9] Naor M. and Shamir A., Visual Cryptography, in Proceedings of Workshop on the Theory and Application of Cryptographic Techniques Perugia , Italy, pp. 1F12, 1995.
[10] Shamir A., How to Share a Secret?, Communications of the ACM , vol. 22, no. 11, pp. 612F613, 1979.
[11] Shao J. and Cao Z., A New Efficient (t, n) Verifiable MultiFSecret Sharing (VMSS) based on YCH Scheme, Applied Mathematics and Computation , vol. 168, no. 1, pp. 135F140, 2005.
[12] Sorin I. and Ioana B., Weighted Threshold Secret Sharing Based on the Chinese Remainder Theorem, Scientific Annals of Cuza University , vol. 15, pp. 161F172, 2005.
[13] Thien C. and Lin J., Secret Image Sharing, Computers and Graphics, vol. 26, no. 1, pp. 765F 770, 2002.
[14] Vikram J., Aparna M., Hariharan R., and Srinivasan E., Number Theory Based Image Compression Encryption and Application to Image Multiplexing, in Proceedings of International Conference on Signal Processing, Communications and Networking , Chennai, India, pp. 59F64, 2007.
[15] Wang R. and Su C., Secret Image Sharing with smaller shadow images, Pattern Recognition Letters, vol. 27, no. 6, pp. 551F555, 2006.
[16] WenFPinn F., NonFExpansion Visual Secret Sharing in Reversible Style, IJCSNS International Journal of Computer Science and Network Security , vol. 9, no. 2, pp. 204F208, 2009.
[17] Yang C., Chang T., and Hwang M., A (t, n) MultiFSecret Sharing Scheme, Applied Mathematics and Computation , vol. 151, no. 2, pp. 483F490, 2004.
[18] Zhao J., Zhang J., and Zhao.R., A Practical Verifiable MultiFSecret Sharing Scheme, Computer Standards and Interfaces , vol. 29, no. 1, pp. 138F141, 2007. Jani AnbarasiL graduated from Manonmanium Sundaranar University, India in 2000 and received her MS degree in Anna University in 2005 in the field of computer science and engineering. At present she is a researcher in Anna University, India. Her research interests incl ude cryptography, image processing and medical applications. Anandha Mala received BE degree from Bharathidhasan University in Computer Science and Engineering in 1992, ME degree in University of Madras in 2001 and PhD degree from Anna University in 2007. Currently, she is working as Professor in Easwari Engineering College, Chennai, India, and heading the Department of Computer Science and Engineering. She has published more tha n 40 technical papers in various International Journa l/ Conferences. She has 20 years of teaching experienc e on graduate level. Her area of interest includes im age processing and grid computing.