Elucidation of Verifiable Secret Sharing Schemes for Images
|Hilina Vadavathi, Teena Thankachan, Shabitha A., Pooja Rokade1
B.E. Students, Dept of Computer Engineering, Pimpri Chinchwad College of Engineering, Pune, Maharashtra, India
|Related article at Pubmed, Scholar Google|
Images proved to be better medium for sharing sensitive data. Earlier secret sharing schemes were based on numbers and further were also applied on images. Most of the existing schemes proposed do not have the capability of verification of the shares and hence are prone to cheating either by the original secret holder or the participants. Some of these schemes provided security but required additional computation in the form of certificate vectors or error correction codes The intent of this paper is to discuss the verifiable secret sharing schemes. The paper analyses these schemes and presents a comparative study of the same. The parameters used for comparative study are threshold, cheater identification, techniques used for verification, need secure channel, etc. This paper will support in choosing the verifiable secret sharing scheme for specific applications.