{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T11:26:11Z","timestamp":1774437971047,"version":"3.50.1"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,9,17]],"date-time":"2020-09-17T00:00:00Z","timestamp":1600300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2020,9,17]],"date-time":"2020-09-17T00:00:00Z","timestamp":1600300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Image Video Proc."],"published-print":{"date-parts":[[2020,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In (<jats:italic>k<\/jats:italic>,<jats:italic>n<\/jats:italic>) secret sharing scheme, one secret is encrypted into <jats:italic>n<\/jats:italic> shares in such a way that only <jats:italic>k<\/jats:italic> or more shares can decrypt the secret. Secret sharing scheme can be extended into the field of multimedia that provides an efficient way to protect confidential information on multimedia. Secret image sharing is just the most important extension of secret sharing that can safely guard the secrecy of images among multiple participants. On the other hand, cheating detection is an important issue in traditional secret sharing schemes that have been discussed for many years. However, the issue of cheating detection in secret image sharing has not been discussed sufficiently. In this paper, we consider the cheating problem in the application of secret image sharing schemes and construct a (<jats:italic>k<\/jats:italic>,<jats:italic>n<\/jats:italic>) secret image sharing scheme with the ability of cheating detection and identification. Our scheme is capable of identifying cheaters when <jats:italic>k<\/jats:italic> participants involve in reconstruction. The cheating identification ability and size of shadow in the proposed scheme are improved from the previous cheating identifiable secret image sharing scheme.<\/jats:p>","DOI":"10.1186\/s13640-020-00529-z","type":"journal-article","created":{"date-parts":[[2020,9,17]],"date-time":"2020-09-17T15:06:15Z","timestamp":1600355175000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Applying cheating identifiable secret sharing scheme in multimedia security"],"prefix":"10.1186","volume":"2020","author":[{"given":"Zheng","family":"Ma","sequence":"first","affiliation":[]},{"given":"Yan","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Xiaohong","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Manjun","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yanxiao","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,17]]},"reference":[{"issue":"11","key":"529_CR1","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"A. Shamir, How to share a secret. Commun. ACM. 22(11), 612\u2013613 (1979).","journal-title":"Commun. ACM"},{"issue":"8","key":"529_CR2","doi-asserted-by":"publisher","first-page":"2443","DOI":"10.1109\/TC.2015.2485220","volume":"65","author":"Z. Wang","year":"2016","unstructured":"Z. Wang, M. Karpovsky, L. Bu, Design of reliable and secure devices realizing Shamir\u2019s secret sharing. IEEE Trans. Comput.65(8), 2443\u20132455 (2016).","journal-title":"IEEE Trans. Comput."},{"issue":"5","key":"529_CR3","doi-asserted-by":"publisher","first-page":"765","DOI":"10.1016\/S0097-8493(02)00131-0","volume":"26","author":"C. C. Thien","year":"2002","unstructured":"C. C. Thien, J. C. Lin, Secret image sharing. Comput. Graph.26(5), 765\u2013770 (2002).","journal-title":"Comput. Graph."},{"issue":"1","key":"529_CR4","doi-asserted-by":"publisher","first-page":"219","DOI":"10.3233\/JIFS-179396","volume":"38","author":"Y. X. Liu","year":"2020","unstructured":"Y. X. Liu, C. N. Yang, Q. D. Sun, Y. C. Chen, (k,n) scalable secret image sharing with multiple decoding options. J. Intell. Fuzzy Syst.38(1), 219\u2013228 (2020).","journal-title":"J. Intell. Fuzzy Syst."},{"key":"529_CR5","doi-asserted-by":"publisher","unstructured":"Y. X. Liu, C. N. Yang, Q. D. Sun, Thresholds based image extraction schemes in big data environment in intelligent traffic management. IEEE Trans. Intell. Transp. Syst. (2020). https:\/\/doi.org\/10.1109\/TITS.2020.2994386.","DOI":"10.1109\/TITS.2020.2994386"},{"issue":"13","key":"529_CR6","doi-asserted-by":"publisher","first-page":"18653","DOI":"10.1007\/s11042-019-7205-4","volume":"78","author":"Y. X. Liu","year":"2019","unstructured":"Y. X. Liu, C. N. Yang, C. M. Wu, Q. D. Sun, W. Bi, Threshold changeable secret image sharing scheme based on interpolation polynomial. Multimed. Tools Appl.78(13), 18653\u201318667 (2019).","journal-title":"Multimed. Tools Appl."},{"issue":"8","key":"529_CR7","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1109\/LSP.2009.2021334","volume":"16","author":"R. Z Wang","year":"2009","unstructured":"R. Z Wang, Region incrementing visual cryptography. IEEE Sig. Process. Lett.16(8), 659\u2013662 (2009).","journal-title":"IEEE Sig. Process. Lett."},{"issue":"5","key":"529_CR8","doi-asserted-by":"publisher","first-page":"799","DOI":"10.1109\/TCSVT.2011.2180952","volume":"22","author":"C. N. Yang","year":"2012","unstructured":"C. N. Yang, H. W. Shih, C. C. Wu, L. Harn, k out of n region incrementing scheme in visual cryptography. IEEE Trans. Circ. Syst. Video Technol.22(5), 799\u2013809 (2012).","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"key":"529_CR9","first-page":"449","volume":"7809","author":"C. N Yang","year":"2013","unstructured":"C. N Yang, Y. C Lin, C. C Wu, Region in region incrementing visual cryptography scheme. Proc. IWDW2012, LNCS. 7809:, 449\u2013463 (2013).","journal-title":"Proc. IWDW2012, LNCS"},{"issue":"3","key":"529_CR10","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/BF02252871","volume":"1","author":"M. Tompa","year":"1989","unstructured":"M. Tompa, H. Woll, How to share a secret with cheaters. J. Cryptol.1(3), 133\u2013138 (1989).","journal-title":"J. Cryptol."},{"issue":"2","key":"529_CR11","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1049\/iet-ifs.2008.0043","volume":"5","author":"P. Y. Lin","year":"2011","unstructured":"P. Y. Lin, Chang C.C., Cheating resistance and reversibility-oriented secret sharing mechanism. IET Inf. Secur.5(2), 81\u201392 (2011).","journal-title":"IET Inf. Secur."},{"key":"529_CR12","first-page":"364","volume-title":"Proceedings of ASIACRYPT, LNCS 4284","author":"S. Obana","year":"2006","unstructured":"S. Obana, T. Araki, in Proceedings of ASIACRYPT, LNCS 4284. Almost optimum secret sharing schemes secure against cheating for arbitrary secret distribution (SpringerHeidelberg, 2006), pp. 364\u2013379."},{"issue":"1","key":"529_CR13","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1137\/S0895480100378689","volume":"20","author":"W. Ogata","year":"2006","unstructured":"W. Ogata, Kurosawa K., Stinson D.R., Optimum secret sharing scheme secure against cheating. SIAM J. Discret. Math.20(1), 79\u201395 (2006).","journal-title":"SIAM J. Discret. Math."},{"key":"529_CR14","first-page":"410","volume-title":"Proceedings of CRYPTO, LNCS 563","author":"K. Kurosawa","year":"1995","unstructured":"K. Kurosawa, S. Obana, W. Ogata, in Proceedings of CRYPTO, LNCS 563. t-cheater identifiable (k,n) secret sharing schemes (SpringerHeidelberg, 1995), pp. 410\u2013423."},{"key":"529_CR15","first-page":"284","volume-title":"Proceedings of EUROCRYPT, LNCS 6632","author":"S. Obana","year":"2011","unstructured":"S. Obana, in Proceedings of EUROCRYPT, LNCS 6632. Almost optimum t-cheater identifiable secret sharing schemes (SpringerHeidelberg, 2011), pp. 284\u2013302."},{"issue":"1","key":"529_CR16","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/s10623-008-9265-8","volume":"52","author":"L. Harn","year":"2009","unstructured":"L. Harn, C. L. Lin, Detection and identification in (t,n) secret sharing scheme. Des. Code Crypt.52(1), 15\u201324 (2009).","journal-title":"Des. Code Crypt."},{"key":"529_CR17","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1016\/S0164-1212(03)00239-5","volume":"73","author":"C. C. Lin","year":"2004","unstructured":"C. C. Lin, W. H. Tsai, Secret image sharing with steganography and authentication. J. Syst. Softw.73:, 405\u2013414 (2004).","journal-title":"J. Syst. Softw."},{"key":"529_CR18","doi-asserted-by":"publisher","first-page":"1070","DOI":"10.1016\/j.jss.2006.11.022","volume":"80","author":"C. N. Yang","year":"2007","unstructured":"C. N. Yang, T. S. Chen, K. H. Yu, C. C. Wang, Improvements of image sharing with steganography and authentication. J. Syst. Softw.80:, 1070\u20131076 (2007).","journal-title":"J. Syst. Softw."},{"key":"529_CR19","doi-asserted-by":"publisher","first-page":"3130","DOI":"10.1016\/j.patcog.2008.04.006","volume":"41","author":"C. C. Chang","year":"2008","unstructured":"C. C. Chang, Y. P. Hsieh, C. H. Lin, Sharing secrets in stego images with authentication. Pattern Recog.41:, 3130\u20133137 (2008).","journal-title":"Pattern Recog."},{"key":"529_CR20","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1186\/s13638-018-1084-7","volume":"2018","author":"Y. X. Liu","year":"2018","unstructured":"Y. X. Liu, Q. D. Sun, C. N. Yang, (k,n) secret image sharing scheme capable of cheating detection. EURASIP J. Wirel. Commun. Netw.2018:, 72 (2018).","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"529_CR21","doi-asserted-by":"publisher","first-page":"1725","DOI":"10.1016\/j.optcom.2011.12.003","volume":"285","author":"C. N. Yang","year":"2012","unstructured":"C. N. Yang, J. F. Quyang, L. Harn, Steganography and authentication in image sharing without party bits. Opt. Commun.285:, 1725\u20131735 (2012).","journal-title":"Opt. Commun."}],"container-title":["EURASIP Journal on Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13640-020-00529-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13640-020-00529-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13640-020-00529-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,16]],"date-time":"2021-09-16T23:33:23Z","timestamp":1631835203000},"score":1,"resource":{"primary":{"URL":"https:\/\/jivp-eurasipjournals.springeropen.com\/articles\/10.1186\/s13640-020-00529-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,17]]},"references-count":21,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["529"],"URL":"https:\/\/doi.org\/10.1186\/s13640-020-00529-z","relation":{},"ISSN":["1687-5281"],"issn-type":[{"value":"1687-5281","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,17]]},"assertion":[{"value":"15 April 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 August 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 September 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"42"}}