Verifiable Visual Cryptography

被引:2
作者
Hsu, Shuo-Fang [1 ]
Chang, Yu-Jie [2 ]
Wang, Ran-Zan
Lee, Yeuan-Kuen [3 ]
Huang, Shih-Yu [3 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp Sci, Hsinchu, Taiwan
[2] Natl Kaohsiung First Univ Sci Technol, Dept Comput Comm Eng, Kaohsiung, Taiwan
[3] Ming Chuan Univ, Dept Comput Sci Info Eng, Taoyuan, Taiwan
来源
2012 SIXTH INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING (ICGEC) | 2012年
关键词
Visual Cryptography; Secret Sharing; Image Sharing; Cheating Prevention; MULTIPLE SECRETS; CONTRAST; SCHEMES;
D O I
10.1109/ICGEC.2012.150
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The paper presents a verifiable visual cryptography (VC) scheme for checking the validness to the shares engaged in a VC decoding instance. The idea is to stamp a continuous pattern on the shares belonging to the same secret image, and a part of the pattern can be revealed through aligning and stacking half of two shares together. The visual coherent among the revealed patterns of all pair of shares provides evidence to the genuine of the shares engaged in the decoding process. Compare to the reported cheating prevention VC schemes, the proposed scheme maintains the original pixel expansion in VC scheme without cheating prevention ability, and the share verification process is done without resorting to any additional verification image. Besides, the proposed verification mechanism can easily be attached to any VC schemes in the literature to endow legitimate user with the ability to prevent cheating from malicious participants.
引用
收藏
页码:464 / 467
页数:4
相关论文
共 50 条
[11]   Region Incrementing Visual Cryptography [J].
Wang, Ran-Zan .
IEEE SIGNAL PROCESSING LETTERS, 2009, 16 (08) :659-662
[12]   Design a new visual cryptography for human-verifiable authentication in accessing a database [J].
Ching-Nung Yang ;
Li-Zhe Sun ;
Xuehu Yan ;
Cheonshik Kim .
Journal of Real-Time Image Processing, 2016, 12 :483-494
[13]   Sharing more information in gray visual cryptography scheme [J].
Li, Peng ;
Yang, Ching-Nung ;
Kong, Qian ;
Ma, Yanpeng ;
Liu, Zheng .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2013, 24 (08) :1380-1393
[14]   Cheating prevention in visual cryptography [J].
Hu, Chih-Ming ;
Tzeng, Wen-Guey .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2007, 16 (01) :36-45
[15]   TAGGED VISUAL CRYPTOGRAPHY WITH ACCESS CONTROL [J].
Chen, Yi-Hui ;
Chan, Chi-Shiang ;
Hsu, Po-Yu ;
Huang, Wei-Lin .
2014 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO WORKSHOPS (ICMEW), 2014,
[16]   HALFTONE VISUAL CRYPTOGRAPHY FOR COLOR IMAGES [J].
Pahuja, Shivani ;
Kasana, Singara Singh .
2017 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS AND ELECTRONICS (COMPTELIX), 2017, :281-285
[17]   Step Construction of Visual Cryptography Schemes [J].
Liu, Feng ;
Wu, Chuankun ;
Lin, Xijun .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (01) :27-38
[18]   Improving the visual quality of size invariant visual cryptography scheme [J].
Liu, Feng ;
Guo, Teng ;
Wu, ChuanKun ;
Qian, Lina .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2012, 23 (02) :331-342
[19]   A (2,2) Visual Cryptography Technique to Share Two Secrets [J].
Bhosale, Akshay G. ;
Patil, Vikram S. .
PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT-2020), 2020, :563-569
[20]   Cheating in visual cryptography [J].
Horng, G ;
Chen, T ;
Tsai, D .
DESIGNS CODES AND CRYPTOGRAPHY, 2006, 38 (02) :219-236