A Verifiable Visual Cryptography Scheme Based on XOR Algorithm

被引:0
作者
Han, Yanyan [1 ]
Dong, Haocong [2 ]
He, Wencai [1 ]
Liu, Juan [2 ]
机构
[1] Beijing Elect Sci & Technol Inst, Dept Sci Res, Beijing 100070, Peoples R China
[2] Xidian Univ, Commun Engn Dept, Xian, Peoples R China
来源
PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY | 2012年
关键词
Visual Cryptography; cheater; verifiable; no pixel expansion;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Visual Cryptography is the same as other secret sharing schemes, which also has the problem of deception. The cheater can destroy the recovery of secret image or gain secret information by cheating through making a counterfeiter of share images. In this paper, in order to resolve the problem of deception, we proposed a verifiable visual cryptography scheme can ensure that the secret image can be visually revealed correctly. This scheme can check and verify the accuracy and truthfulness of every share image, which is simple to decrypt and without any pixel expansion.
引用
收藏
页码:673 / 677
页数:5
相关论文
共 12 条
[1]  
Chen Qin, 2011, Application Research of Computers, V28, P318, DOI 10.3969/j.issn.1001-3695.2011.01.089
[2]  
Chen Yu-ling, 2008, Computer Engineering and Design, V29, P5430
[3]  
Fu Zhengxin, 2009, COMPUTER TECHNOLOGY, P539
[4]  
Han Yanyan, 2009, STUDY VISUAL CRYPTOG
[5]  
Naor M., 1994, Workshop on the theory and application of of cryptographic techniques, P1, DOI [DOI 10.1007/BFB0053419, 10.1007/BFb0053419, DOI 10.1007/978-1-4939-9484-7_1]
[6]  
Wang Beniian, 2009, INFORM ELECT ENG, V7, p[339, 365]
[7]  
Wang Yiwei, 2008, COMPUTER TECHNOLOGY, P492
[8]  
Xu Xiaohui, 2007, CHEATER DETECTABLE V, P1335
[9]  
Yan Hao, 2004, Journal of Shanghai Jiaotong University, V38, P107
[10]   Multi-secret sharing threshold visual cryptography scheme [J].
Yu, Bin ;
Xu, Xiaohui ;
Fang, Liguo .
CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, :815-+