SlideShare une entreprise Scribd logo
1  sur  14
Detection and identification of
cheaters in (t, n) secret
sharing scheme
Presented by
Outline
• Problem definition
• Literature survey
• System features
• System Architecture
• Analysis Models
• UML diagrams
• System Implementation Plans
• Grantt chart, Cost implementation model
Problem definition
In a (t, n) secret sharing scheme, a secret s is divided
into n shares and shared among a set of n shareholders
by a mutually trusted dealer in such a way that any t or
more than t shares will be able to reconstruct this secret;
but fewer than t shares cannot know any information
about the secret.
Literature survey
 There are many research papers in the literatures to investigate the problem of cheater
detection and/or identification for secret sharing schemes.
 In 1979, Shamir and Blakley first developed the concept of the (t,n) threshold secret sharing scheme.
Then Naor and Shamir extended the secret sharing concept into image research, and referred it as image
secret sharing in 1994, which was based on the model of secret sharing proposed by the two above-
mentioned scholars: For image information P, we would like to generate n shadow images so that any t or
more participants can reconstruct the original secret image, but any t-1 or less participants can not get
sufficient information to reconstruct the original secret image.
 After Naor and Shamir, many secret sharing schemes have been proposed for processing 256 gray-level
image. But in these schemes, shadow images have larger image sizes compared to that of the original
secret image. The contrast ratio in the reconstructed image is quite poor
System features
 Hardware & Software Requirements
Hard disk 80 GB
RAM 1GB
Technology Java
Tools Net-beans IDE
Processor Intel Pentium IV or above
Operating System Windows XP
System features continued..
Quality Attributes
• Usability : The application seem to user friendly since the GUI is
interactive.
• Maintainability : This application is maintained for long period of time
since it will be implemented under java platform .
• Reusability : The application can be reusable by expanding it to the
new modules
• Portability: The application is purely a portable mobile application since it
can only be operated on android Operating system.
System architecture
• Thien-Lin scheme and the intractability of the
discrete logarithm:
• IT contains three phases: Initialization phase, Construction phase
and Reconstruction & Verification phase:
•
• Initialization phase: In this phase, the holder and the participants need some
intercommunication, but this can be done over a public channel. Firstly, H chooses two
prime numbers, p and q, and computes N=pq. Both p and q should satisfy the same
properties as the two primes used in RSA cryptosystem which can prevent anybody
factor N efficiently. Subsequently, H chooses an integer g∈[N1/2,N] such that g is
relatively prime to p and q. Publishes {g, N}.Each participant Mi∈M randomly chooses
an si∈[2, N] asher/his own secret shadow and computes Ri =gsi modN, finally Mi
provides Ri to H. H must ensure that Ri≠Rj for all Mi≠Mj. Once Ri=Rj, H should
demand these Mi s to choose new si s. Publishes Ri.
System architecture
Construction phase: H randomly chooses an integer s0∈[2,N] such that s0 is
relatively prime to (p−1) and (q−1). Then H computes f and makes
s0 f=1modφ(N), whereφ(N) is the Euler phi-function;
H Computes R0 =gs0 modN and Ii =Rs0 i modN, i=1, 2,…, n. Publishes {R0, f};
The new image P′ is divided into several sections according to lexicography
order. Each section contains t pixels, and each pixel of the image belongs to one
and only one section. For the section j, H constructs (t−1) th-degree polynomial
hj(x) mod 251 as follows:
hjðxÞ ¼ b0 þ b1x þ: : : þ bt_1xt_1mod251:
Here b0, b1,…, bt − 1 are the t pixels of the section;
H evaluates yi=hj(Ii), i=1, 2,…, n. Publishes (y1, y2,…,y
System architecture
 Reconstruction and verification phase : Without loss of generality, members of M′={M1,
M2,…, Mt} will cooperate to reconstruct the image P′.
1) Mi∈M′ computes her/his own sub-secret(pseudo shadow) Ii V¼ Rsi 0 modN, where si is secret
shadow of Mi;
2) Anybody can verify Ii′ provided by Mi: if I′I f=Ri mod N, then Ii′ is true; otherwise Ii′ is false
and Mi may be a cheater;
Reconstruct the image P′: with the knowledge of t pairs of (Ii′,yi) and the Lagrange
interpolating polynomial, the (t−1)th-degree polynomial hj(x) can be uniquely determined as
follows:
 In initialization phase, each participant Mi chooses her/his own secret shadow si, the holder H is absolutely
not a cheater
Use case
Activity
State transition
System Implementation Plan
SR
No
Task Name Duration
1 Project topic finalization 10 days
2 Studying Core java,J2SE 10 days
3 Implementation of Shamir’s SSS system 30 days
4 Implementation of detecting system 7 days
5 Implementation of identifying cheaters 10 days
Grant chart & cost implementation
model
0
1000
2000
3000
4000
5000
6000
7000
8000
9000
10000
Training System
installation
Studying Core
java
Implementation
of Modules
Testing Documentation
Cost(in RS)
Time(in days)

Contenu connexe

Tendances

Basics of Image Processing using MATLAB
Basics of Image Processing using MATLABBasics of Image Processing using MATLAB
Basics of Image Processing using MATLABvkn13
 
Introductory Digital Image Processing using Matlab, IIT Roorkee
Introductory Digital Image Processing using Matlab, IIT RoorkeeIntroductory Digital Image Processing using Matlab, IIT Roorkee
Introductory Digital Image Processing using Matlab, IIT RoorkeeVinayak Sahai
 
Designing a Proof GUI for Non-Experts
Designing a Proof GUI for Non-ExpertsDesigning a Proof GUI for Non-Experts
Designing a Proof GUI for Non-ExpertsMartin Homik
 
Image Matting Using Linear Optimization
Image Matting Using Linear OptimizationImage Matting Using Linear Optimization
Image Matting Using Linear OptimizationConrad Triquell
 
Point cloud library
Point cloud libraryPoint cloud library
Point cloud libraryBindu Karki
 
Forelasning4
Forelasning4Forelasning4
Forelasning4Memo Love
 
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGESA NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGESIJTET Journal
 
유한요소법(FEM)을 이용한 구조해석
유한요소법(FEM)을 이용한 구조해석유한요소법(FEM)을 이용한 구조해석
유한요소법(FEM)을 이용한 구조해석chimco.net
 
Images in matlab
Images in matlabImages in matlab
Images in matlabAli Alvi
 
Image Storage, Indexing and Recognition
Image Storage, Indexing and RecognitionImage Storage, Indexing and Recognition
Image Storage, Indexing and RecognitionAdeel Riaz
 
GASGD: Stochastic Gradient Descent for Distributed Asynchronous Matrix Comple...
GASGD: Stochastic Gradient Descent for Distributed Asynchronous Matrix Comple...GASGD: Stochastic Gradient Descent for Distributed Asynchronous Matrix Comple...
GASGD: Stochastic Gradient Descent for Distributed Asynchronous Matrix Comple...Fabio Petroni, PhD
 
Summer training matlab
Summer training matlab Summer training matlab
Summer training matlab Arshit Rai
 
LCBM: Statistics-Based Parallel Collaborative Filtering
LCBM: Statistics-Based Parallel Collaborative FilteringLCBM: Statistics-Based Parallel Collaborative Filtering
LCBM: Statistics-Based Parallel Collaborative FilteringFabio Petroni, PhD
 
Matlab for Electrical Engineers
Matlab for Electrical EngineersMatlab for Electrical Engineers
Matlab for Electrical EngineersManish Joshi
 

Tendances (20)

Basics of Image Processing using MATLAB
Basics of Image Processing using MATLABBasics of Image Processing using MATLAB
Basics of Image Processing using MATLAB
 
Introductory Digital Image Processing using Matlab, IIT Roorkee
Introductory Digital Image Processing using Matlab, IIT RoorkeeIntroductory Digital Image Processing using Matlab, IIT Roorkee
Introductory Digital Image Processing using Matlab, IIT Roorkee
 
Designing a Proof GUI for Non-Experts
Designing a Proof GUI for Non-ExpertsDesigning a Proof GUI for Non-Experts
Designing a Proof GUI for Non-Experts
 
Matlab project
Matlab projectMatlab project
Matlab project
 
Image Matting Using Linear Optimization
Image Matting Using Linear OptimizationImage Matting Using Linear Optimization
Image Matting Using Linear Optimization
 
Point cloud library
Point cloud libraryPoint cloud library
Point cloud library
 
Forelasning4
Forelasning4Forelasning4
Forelasning4
 
C basics
C basicsC basics
C basics
 
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGESA NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
 
MATLAB
MATLABMATLAB
MATLAB
 
유한요소법(FEM)을 이용한 구조해석
유한요소법(FEM)을 이용한 구조해석유한요소법(FEM)을 이용한 구조해석
유한요소법(FEM)을 이용한 구조해석
 
Matlab Working With Images
Matlab Working With ImagesMatlab Working With Images
Matlab Working With Images
 
Images in matlab
Images in matlabImages in matlab
Images in matlab
 
Log polar coordinates
Log polar coordinatesLog polar coordinates
Log polar coordinates
 
Image Storage, Indexing and Recognition
Image Storage, Indexing and RecognitionImage Storage, Indexing and Recognition
Image Storage, Indexing and Recognition
 
Autoencoder
AutoencoderAutoencoder
Autoencoder
 
GASGD: Stochastic Gradient Descent for Distributed Asynchronous Matrix Comple...
GASGD: Stochastic Gradient Descent for Distributed Asynchronous Matrix Comple...GASGD: Stochastic Gradient Descent for Distributed Asynchronous Matrix Comple...
GASGD: Stochastic Gradient Descent for Distributed Asynchronous Matrix Comple...
 
Summer training matlab
Summer training matlab Summer training matlab
Summer training matlab
 
LCBM: Statistics-Based Parallel Collaborative Filtering
LCBM: Statistics-Based Parallel Collaborative FilteringLCBM: Statistics-Based Parallel Collaborative Filtering
LCBM: Statistics-Based Parallel Collaborative Filtering
 
Matlab for Electrical Engineers
Matlab for Electrical EngineersMatlab for Electrical Engineers
Matlab for Electrical Engineers
 

Similaire à Detection and identification of cheaters in (t, n) secret

Copyright protection scheme based on visual Cryptography: A Review
Copyright protection scheme based on visual Cryptography: A ReviewCopyright protection scheme based on visual Cryptography: A Review
Copyright protection scheme based on visual Cryptography: A Reviewiosrjce
 
Image Classification using Deep Learning
Image Classification using Deep LearningImage Classification using Deep Learning
Image Classification using Deep LearningIRJET Journal
 
Human Head Counting and Detection using Convnets
Human Head Counting and Detection using ConvnetsHuman Head Counting and Detection using Convnets
Human Head Counting and Detection using Convnetsrahulmonikasharma
 
Performance Anaysis for Imaging System
Performance Anaysis for Imaging SystemPerformance Anaysis for Imaging System
Performance Anaysis for Imaging SystemVrushali Lanjewar
 
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET Journal
 
00463517b1e90c1e63000000
00463517b1e90c1e6300000000463517b1e90c1e63000000
00463517b1e90c1e63000000Ivonne Liu
 
IMAGE SEGMENTATION AND ITS TECHNIQUES
IMAGE SEGMENTATION AND ITS TECHNIQUESIMAGE SEGMENTATION AND ITS TECHNIQUES
IMAGE SEGMENTATION AND ITS TECHNIQUESIRJET Journal
 
A Pointing Gesture-based Signal to Text Communication System Using OpenCV in ...
A Pointing Gesture-based Signal to Text Communication System Using OpenCV in ...A Pointing Gesture-based Signal to Text Communication System Using OpenCV in ...
A Pointing Gesture-based Signal to Text Communication System Using OpenCV in ...IRJET Journal
 
Comparison of Various RCNN techniques for Classification of Object from Image
Comparison of Various RCNN techniques for Classification of Object from ImageComparison of Various RCNN techniques for Classification of Object from Image
Comparison of Various RCNN techniques for Classification of Object from ImageIRJET Journal
 
IRJET - Single Image Super Resolution using Machine Learning
IRJET - Single Image Super Resolution using Machine LearningIRJET - Single Image Super Resolution using Machine Learning
IRJET - Single Image Super Resolution using Machine LearningIRJET Journal
 
A Beginner's Guide to Monocular Depth Estimation
A Beginner's Guide to Monocular Depth EstimationA Beginner's Guide to Monocular Depth Estimation
A Beginner's Guide to Monocular Depth EstimationRyo Takahashi
 
1 of 6 LAB 5 IMAGE FILTERING ECE180 Introduction to.docx
1 of 6  LAB 5 IMAGE FILTERING ECE180 Introduction to.docx1 of 6  LAB 5 IMAGE FILTERING ECE180 Introduction to.docx
1 of 6 LAB 5 IMAGE FILTERING ECE180 Introduction to.docxmercysuttle
 
Image processing using matlab
Image processing using matlabImage processing using matlab
Image processing using matlabdedik dafiyanto
 
Ax31139148
Ax31139148Ax31139148
Ax31139148IJMER
 

Similaire à Detection and identification of cheaters in (t, n) secret (20)

mini prjt
mini prjtmini prjt
mini prjt
 
Copyright protection scheme based on visual Cryptography: A Review
Copyright protection scheme based on visual Cryptography: A ReviewCopyright protection scheme based on visual Cryptography: A Review
Copyright protection scheme based on visual Cryptography: A Review
 
N017327985
N017327985N017327985
N017327985
 
Image Classification using Deep Learning
Image Classification using Deep LearningImage Classification using Deep Learning
Image Classification using Deep Learning
 
Deep learning (2)
Deep learning (2)Deep learning (2)
Deep learning (2)
 
Human Head Counting and Detection using Convnets
Human Head Counting and Detection using ConvnetsHuman Head Counting and Detection using Convnets
Human Head Counting and Detection using Convnets
 
Performance Anaysis for Imaging System
Performance Anaysis for Imaging SystemPerformance Anaysis for Imaging System
Performance Anaysis for Imaging System
 
Visual CryptoGraphy
Visual CryptoGraphyVisual CryptoGraphy
Visual CryptoGraphy
 
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
 
00463517b1e90c1e63000000
00463517b1e90c1e6300000000463517b1e90c1e63000000
00463517b1e90c1e63000000
 
IMAGE SEGMENTATION AND ITS TECHNIQUES
IMAGE SEGMENTATION AND ITS TECHNIQUESIMAGE SEGMENTATION AND ITS TECHNIQUES
IMAGE SEGMENTATION AND ITS TECHNIQUES
 
A Pointing Gesture-based Signal to Text Communication System Using OpenCV in ...
A Pointing Gesture-based Signal to Text Communication System Using OpenCV in ...A Pointing Gesture-based Signal to Text Communication System Using OpenCV in ...
A Pointing Gesture-based Signal to Text Communication System Using OpenCV in ...
 
Comparison of Various RCNN techniques for Classification of Object from Image
Comparison of Various RCNN techniques for Classification of Object from ImageComparison of Various RCNN techniques for Classification of Object from Image
Comparison of Various RCNN techniques for Classification of Object from Image
 
IRJET - Single Image Super Resolution using Machine Learning
IRJET - Single Image Super Resolution using Machine LearningIRJET - Single Image Super Resolution using Machine Learning
IRJET - Single Image Super Resolution using Machine Learning
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
 
A Beginner's Guide to Monocular Depth Estimation
A Beginner's Guide to Monocular Depth EstimationA Beginner's Guide to Monocular Depth Estimation
A Beginner's Guide to Monocular Depth Estimation
 
1 of 6 LAB 5 IMAGE FILTERING ECE180 Introduction to.docx
1 of 6  LAB 5 IMAGE FILTERING ECE180 Introduction to.docx1 of 6  LAB 5 IMAGE FILTERING ECE180 Introduction to.docx
1 of 6 LAB 5 IMAGE FILTERING ECE180 Introduction to.docx
 
Image processing using matlab
Image processing using matlabImage processing using matlab
Image processing using matlab
 
Ax31139148
Ax31139148Ax31139148
Ax31139148
 
Matlab dip
Matlab dipMatlab dip
Matlab dip
 

Plus de Parag Tamhane

A two stage feature selection method for text categorization
A two stage feature selection method for text categorizationA two stage feature selection method for text categorization
A two stage feature selection method for text categorizationParag Tamhane
 
Outlier detection for high dimensional data
Outlier detection for high dimensional dataOutlier detection for high dimensional data
Outlier detection for high dimensional dataParag Tamhane
 
2 d barcode based mobile payment system
2 d barcode based mobile payment system2 d barcode based mobile payment system
2 d barcode based mobile payment systemParag Tamhane
 
3 d antiphishing based cryptography
3 d antiphishing based cryptography3 d antiphishing based cryptography
3 d antiphishing based cryptographyParag Tamhane
 
Mpeg 7 video signature tools for content recognition
Mpeg 7 video signature tools for content recognitionMpeg 7 video signature tools for content recognition
Mpeg 7 video signature tools for content recognitionParag Tamhane
 
Integration of sound signature in graphical password
Integration of sound signature in graphical passwordIntegration of sound signature in graphical password
Integration of sound signature in graphical passwordParag Tamhane
 
Multi biometric cryptosystems based on feature-level fusion
Multi biometric cryptosystems based on feature-level fusionMulti biometric cryptosystems based on feature-level fusion
Multi biometric cryptosystems based on feature-level fusionParag Tamhane
 

Plus de Parag Tamhane (7)

A two stage feature selection method for text categorization
A two stage feature selection method for text categorizationA two stage feature selection method for text categorization
A two stage feature selection method for text categorization
 
Outlier detection for high dimensional data
Outlier detection for high dimensional dataOutlier detection for high dimensional data
Outlier detection for high dimensional data
 
2 d barcode based mobile payment system
2 d barcode based mobile payment system2 d barcode based mobile payment system
2 d barcode based mobile payment system
 
3 d antiphishing based cryptography
3 d antiphishing based cryptography3 d antiphishing based cryptography
3 d antiphishing based cryptography
 
Mpeg 7 video signature tools for content recognition
Mpeg 7 video signature tools for content recognitionMpeg 7 video signature tools for content recognition
Mpeg 7 video signature tools for content recognition
 
Integration of sound signature in graphical password
Integration of sound signature in graphical passwordIntegration of sound signature in graphical password
Integration of sound signature in graphical password
 
Multi biometric cryptosystems based on feature-level fusion
Multi biometric cryptosystems based on feature-level fusionMulti biometric cryptosystems based on feature-level fusion
Multi biometric cryptosystems based on feature-level fusion
 

Dernier

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

Dernier (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 

Detection and identification of cheaters in (t, n) secret

  • 1. Detection and identification of cheaters in (t, n) secret sharing scheme Presented by
  • 2. Outline • Problem definition • Literature survey • System features • System Architecture • Analysis Models • UML diagrams • System Implementation Plans • Grantt chart, Cost implementation model
  • 3. Problem definition In a (t, n) secret sharing scheme, a secret s is divided into n shares and shared among a set of n shareholders by a mutually trusted dealer in such a way that any t or more than t shares will be able to reconstruct this secret; but fewer than t shares cannot know any information about the secret.
  • 4. Literature survey  There are many research papers in the literatures to investigate the problem of cheater detection and/or identification for secret sharing schemes.  In 1979, Shamir and Blakley first developed the concept of the (t,n) threshold secret sharing scheme. Then Naor and Shamir extended the secret sharing concept into image research, and referred it as image secret sharing in 1994, which was based on the model of secret sharing proposed by the two above- mentioned scholars: For image information P, we would like to generate n shadow images so that any t or more participants can reconstruct the original secret image, but any t-1 or less participants can not get sufficient information to reconstruct the original secret image.  After Naor and Shamir, many secret sharing schemes have been proposed for processing 256 gray-level image. But in these schemes, shadow images have larger image sizes compared to that of the original secret image. The contrast ratio in the reconstructed image is quite poor
  • 5. System features  Hardware & Software Requirements Hard disk 80 GB RAM 1GB Technology Java Tools Net-beans IDE Processor Intel Pentium IV or above Operating System Windows XP
  • 6. System features continued.. Quality Attributes • Usability : The application seem to user friendly since the GUI is interactive. • Maintainability : This application is maintained for long period of time since it will be implemented under java platform . • Reusability : The application can be reusable by expanding it to the new modules • Portability: The application is purely a portable mobile application since it can only be operated on android Operating system.
  • 7. System architecture • Thien-Lin scheme and the intractability of the discrete logarithm: • IT contains three phases: Initialization phase, Construction phase and Reconstruction & Verification phase: • • Initialization phase: In this phase, the holder and the participants need some intercommunication, but this can be done over a public channel. Firstly, H chooses two prime numbers, p and q, and computes N=pq. Both p and q should satisfy the same properties as the two primes used in RSA cryptosystem which can prevent anybody factor N efficiently. Subsequently, H chooses an integer g∈[N1/2,N] such that g is relatively prime to p and q. Publishes {g, N}.Each participant Mi∈M randomly chooses an si∈[2, N] asher/his own secret shadow and computes Ri =gsi modN, finally Mi provides Ri to H. H must ensure that Ri≠Rj for all Mi≠Mj. Once Ri=Rj, H should demand these Mi s to choose new si s. Publishes Ri.
  • 8. System architecture Construction phase: H randomly chooses an integer s0∈[2,N] such that s0 is relatively prime to (p−1) and (q−1). Then H computes f and makes s0 f=1modφ(N), whereφ(N) is the Euler phi-function; H Computes R0 =gs0 modN and Ii =Rs0 i modN, i=1, 2,…, n. Publishes {R0, f}; The new image P′ is divided into several sections according to lexicography order. Each section contains t pixels, and each pixel of the image belongs to one and only one section. For the section j, H constructs (t−1) th-degree polynomial hj(x) mod 251 as follows: hjðxÞ ¼ b0 þ b1x þ: : : þ bt_1xt_1mod251: Here b0, b1,…, bt − 1 are the t pixels of the section; H evaluates yi=hj(Ii), i=1, 2,…, n. Publishes (y1, y2,…,y
  • 9. System architecture  Reconstruction and verification phase : Without loss of generality, members of M′={M1, M2,…, Mt} will cooperate to reconstruct the image P′. 1) Mi∈M′ computes her/his own sub-secret(pseudo shadow) Ii V¼ Rsi 0 modN, where si is secret shadow of Mi; 2) Anybody can verify Ii′ provided by Mi: if I′I f=Ri mod N, then Ii′ is true; otherwise Ii′ is false and Mi may be a cheater; Reconstruct the image P′: with the knowledge of t pairs of (Ii′,yi) and the Lagrange interpolating polynomial, the (t−1)th-degree polynomial hj(x) can be uniquely determined as follows:  In initialization phase, each participant Mi chooses her/his own secret shadow si, the holder H is absolutely not a cheater
  • 13. System Implementation Plan SR No Task Name Duration 1 Project topic finalization 10 days 2 Studying Core java,J2SE 10 days 3 Implementation of Shamir’s SSS system 30 days 4 Implementation of detecting system 7 days 5 Implementation of identifying cheaters 10 days
  • 14. Grant chart & cost implementation model 0 1000 2000 3000 4000 5000 6000 7000 8000 9000 10000 Training System installation Studying Core java Implementation of Modules Testing Documentation Cost(in RS) Time(in days)