Verifiable Visual Cryptography

被引:2
|
作者
Hsu, Shuo-Fang [1 ]
Chang, Yu-Jie [2 ]
Wang, Ran-Zan
Lee, Yeuan-Kuen [3 ]
Huang, Shih-Yu [3 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp Sci, Hsinchu, Taiwan
[2] Natl Kaohsiung First Univ Sci Technol, Dept Comput Comm Eng, Kaohsiung, Taiwan
[3] Ming Chuan Univ, Dept Comput Sci Info Eng, Taoyuan, Taiwan
来源
2012 SIXTH INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING (ICGEC) | 2012年
关键词
Visual Cryptography; Secret Sharing; Image Sharing; Cheating Prevention; MULTIPLE SECRETS; CONTRAST; SCHEMES;
D O I
10.1109/ICGEC.2012.150
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The paper presents a verifiable visual cryptography (VC) scheme for checking the validness to the shares engaged in a VC decoding instance. The idea is to stamp a continuous pattern on the shares belonging to the same secret image, and a part of the pattern can be revealed through aligning and stacking half of two shares together. The visual coherent among the revealed patterns of all pair of shares provides evidence to the genuine of the shares engaged in the decoding process. Compare to the reported cheating prevention VC schemes, the proposed scheme maintains the original pixel expansion in VC scheme without cheating prevention ability, and the share verification process is done without resorting to any additional verification image. Besides, the proposed verification mechanism can easily be attached to any VC schemes in the literature to endow legitimate user with the ability to prevent cheating from malicious participants.
引用
收藏
页码:464 / 467
页数:4
相关论文
共 50 条
  • [1] A verifiable visual cryptography scheme
    Han, Yan-Yan
    Wang, Su-Ying
    Hu, Yu-Pu
    He, Wen-Cai
    Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology, 2009, 31 (01): : 86 - 89
  • [2] A Verifiable Visual Cryptography Scheme
    Yu, Bin
    Fang, Liguo
    Xu, Xiaohui
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 908 - 911
  • [3] VPVC: verifiable progressive visual cryptography
    Shivendra Shivani
    Suneeta Agarwal
    Pattern Analysis and Applications, 2018, 21 : 139 - 166
  • [4] VPVC: verifiable progressive visual cryptography
    Shivani, Shivendra
    Agarwal, Suneeta
    PATTERN ANALYSIS AND APPLICATIONS, 2018, 21 (01) : 139 - 166
  • [5] A Verifiable Visual Cryptography Scheme Using Neural Networks
    Deng Yuqiao
    Song Ge
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 113 - 116
  • [6] VMVC: Verifiable multi-tone visual cryptography
    Shivani, Shivendra
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (05) : 5169 - 5188
  • [7] VMVC: Verifiable multi-tone visual cryptography
    Shivendra Shivani
    Multimedia Tools and Applications, 2018, 77 : 5169 - 5188
  • [8] A Verifiable Visual Cryptography Scheme Based on XOR Algorithm
    Han, Yanyan
    Dong, Haocong
    He, Wencai
    Liu, Juan
    PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 673 - 677
  • [9] Design a new visual cryptography for human-verifiable authentication in accessing a database
    Yang, Ching-Nung
    Sun, Li-Zhe
    Yan, Xuehu
    Kim, Cheonshik
    JOURNAL OF REAL-TIME IMAGE PROCESSING, 2016, 12 (02) : 483 - 494
  • [10] Design a new visual cryptography for human-verifiable authentication in accessing a database
    Ching-Nung Yang
    Li-Zhe Sun
    Xuehu Yan
    Cheonshik Kim
    Journal of Real-Time Image Processing, 2016, 12 : 483 - 494