Verifiable Visual Cryptography

被引:2
作者
Hsu, Shuo-Fang [1 ]
Chang, Yu-Jie [2 ]
Wang, Ran-Zan
Lee, Yeuan-Kuen [3 ]
Huang, Shih-Yu [3 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp Sci, Hsinchu, Taiwan
[2] Natl Kaohsiung First Univ Sci Technol, Dept Comput Comm Eng, Kaohsiung, Taiwan
[3] Ming Chuan Univ, Dept Comput Sci Info Eng, Taoyuan, Taiwan
来源
2012 SIXTH INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING (ICGEC) | 2012年
关键词
Visual Cryptography; Secret Sharing; Image Sharing; Cheating Prevention; MULTIPLE SECRETS; CONTRAST; SCHEMES;
D O I
10.1109/ICGEC.2012.150
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The paper presents a verifiable visual cryptography (VC) scheme for checking the validness to the shares engaged in a VC decoding instance. The idea is to stamp a continuous pattern on the shares belonging to the same secret image, and a part of the pattern can be revealed through aligning and stacking half of two shares together. The visual coherent among the revealed patterns of all pair of shares provides evidence to the genuine of the shares engaged in the decoding process. Compare to the reported cheating prevention VC schemes, the proposed scheme maintains the original pixel expansion in VC scheme without cheating prevention ability, and the share verification process is done without resorting to any additional verification image. Besides, the proposed verification mechanism can easily be attached to any VC schemes in the literature to endow legitimate user with the ability to prevent cheating from malicious participants.
引用
收藏
页码:464 / 467
页数:4
相关论文
共 50 条
[21]   Applications of visual cryptography [J].
Rao, Subba Y. V. ;
Roy, Bimal K. .
INTERNATIONAL JOURNAL OF PARALLEL EMERGENT AND DISTRIBUTED SYSTEMS, 2011, 26 (05) :429-442
[22]   Halftone visual cryptography [J].
Zhou, Zhi ;
Arce, Gonzalo R. ;
Di Crescenzo, Giovanni .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2006, 15 (08) :2441-2453
[23]   Randomness in visual cryptography [J].
De Bonis, A ;
De Santis, A .
STACS 2000: 17TH ANNUAL SYMPOSIUM ON THEORETICAL ASPECT OF COMPUTER SCIENCE, 2000, 1770 :626-638
[24]   Cheating in Visual Cryptography [J].
Gwoboa Horng ;
Tzungher Chen ;
Du-shiau Tsai .
Designs, Codes and Cryptography, 2006, 38 :219-236
[25]   On the security of a visual cryptography scheme for color images [J].
Leung, Bert W. ;
Ng, Felix Y. ;
Wong, Duncan S. .
PATTERN RECOGNITION, 2009, 42 (05) :929-940
[26]   A new definition of the contrast of visual cryptography scheme [J].
Liu, Feng ;
Wu, ChuanKun ;
Lin, XiJun .
INFORMATION PROCESSING LETTERS, 2010, 110 (07) :241-246
[27]   Dynamic visual cryptography based on chaotic oscillations [J].
Petrauskiene, Vilma ;
Palivonaite, Rita ;
Aleksa, Algiment ;
Ragulskis, Minvydas .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2014, 19 (01) :112-120
[28]   Improved tagged visual cryptography by random grids [J].
Wu, Xiaotian ;
Sun, Wei .
SIGNAL PROCESSING, 2014, 97 :64-82
[29]   Contrast Optimization for Size Invariant Visual Cryptography Scheme [J].
Wu, Xiaotian ;
Fang, Jia ;
Yan, Wei Qi .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2023, 32 :2174-2189
[30]   Evolution of Visual Cryptography Basis Matrices with Binary Chromosomes [J].
Buckley, Neil ;
Nagar, Atulya ;
Arumugam, Subramanian .
2013 8TH EUROSIM CONGRESS ON MODELLING AND SIMULATION (EUROSIM), 2013, :7-12