Table of Contents Author Guidelines Submit a Manuscript
Chinese Journal of Engineering
Volume 2014 (2014), Article ID 736750, 7 pages
Research Article

SSDLP: Sharing Secret Data between Leader and Participant

College of Badr, Department of Computer, Taibah University, Medina, Saudi Arabia

Received 30 September 2013; Accepted 7 November 2013; Published 14 January 2014

Academic Editors: Z. Shi and S. Simani

Copyright © 2014 Hazem Al-Najjar and Nadia Al-Rousan. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


This paper investigates the problem of sharing the secret document containing a secret data between leader and participant(s) depending on specific conditions and rules. The participant(s) can retrieve part of the secret document but will not be able to retrieve any secret data without the leader. At the same time, the leader may have a little information about the secret document but cannot retrieve the secret data and the secret document without cooperating with participant(s). To evaluate the proposed model and the system efficiency, four tests are suggested, which are concatenation and sharing data test, leader visual test, information entropy analysis, and correlation analysis. Results show that the proposed model is efficient in sharing the data between the leader and participant(s) and the model can achieve our concept of the data sharing between leader and participant(s). However, by analyzing the proposed model using numerical tests and visual tests, the results show that the visual tests will not give attackers useful information about the original data, while the numerical tests show that the entropy attacks are not possible and the correlation between the adjacent pixels will not give useful information. Finally, the results show that the proposed model is strong against different types of attacks.