Cheating prevention and detection technique in visual secret sharing

被引:0
作者
Yadav M. [1 ]
Ranvijay [1 ]
机构
[1] Computer Science and Engineering Department, Motilal Nehru National Institute of Technology, Allahabad, Prayagraj
来源
Ingenierie des Systemes d'Information | 2020年 / 25卷 / 04期
关键词
Cheating prevention; Collusion attack; Hamming code; Visual secret sharing;
D O I
10.18280/isi.250407
中图分类号
学科分类号
摘要
Visual secret sharing (VSS) has various applications such as visual authentication, access control, steganography, watermarking etc. But there is a possibility of cheating or collusive attack in VSS, where some malicious participants can mislead other honest participants by fake shares. Many research groups have worked on the above-stated problem. All the existed techniques suffer from at least one of the following problems such as additional verification shares, pixel expansion and poor visual quality of a reconstructed secret image. The proposed scheme overcomes all the above discussed shortcomings. Proposed work is based on the hamming code. Moreover, it retains the originality of bit by correcting the modified bit. The novelty of the proposed work is to convert the fake/ modified shares into the original shares with 100% accuracy. The theoretical and experimental analysis shows the effectiveness of the proposed work. © 2020 International Information and Engineering Technology Association. All rights reserved.
引用
收藏
页码:453 / 460
页数:7
相关论文
共 15 条
  • [1] Yan W.Q., Jin D., Kankanhalli M.S., Visual cryptography for print and scan applications, Proceedings of International Symposium on Circuits and Systems, pp. 572-575, (2004)
  • [2] Subba Rao Y.V., Sukonkina Y., Bhagwati C., Singh U.K., Fingerprint based authentication application using visual cryptography methods, TENCON 2008 - 2008 IEEE Region 10 Conference, (2008)
  • [3] Naor M., Shamir A., Visual cryptography, Advances in Cryptology - EUROCRYPT'94. EUROCRYPT 1994. Lecture Notes in Computer Science, 950, (1994)
  • [4] Kafri O., Keren E., Encryption of pictures and shapes by random grids, Optics Letters, 12, 6, pp. 377-379, (1987)
  • [5] Horng G.B., Chen T.H., Tsai D.S., Cheating in visual cryptography, Designs, Codes and Cryptography, 38, pp. 219-236, (2007)
  • [6] Hu C.M., Tzeng W.G., Cheating prevention in visual cryptography, IEEE Transactions on Image Processing, 16, 1, pp. 36-45, (2006)
  • [7] Chen Y.C., Tsai D.S., Horng G.B., A new authentication based cheating prevention scheme in Naor-Shamirs visual cryptography, Journal of Visual Communication and Image Representation, 23, 8, pp. 1225-1233, (2012)
  • [8] Chen Y.C., Horng G.B., Tsai D.S., Comment on cheating prevention in visual cryptography, IEEE Transactions on Image Processing, 21, 7, pp. 3319-3322, (2012)
  • [9] Lin P.Y., Wang R.Z., Chang Y.J., Fang W.P., Prevention of cheating in visual cryptography by using coherent patterns, Information Sciences, 301, pp. 61-74, (2015)
  • [10] Yang C.N., Cimato S., Wu J.H., Cai S.R., 3-out-of-n cheating prevention visual cryptographic schemes, ICISSP 2016 (International Conference on Information Systems Security and Privacy), Proc. of ICISSP, pp. 400-406, (2016)