A cheating immune (k, n) visual cryptography scheme by using the rotation of shares

被引:4
|
作者
Zhao, Yongkang [1 ,2 ]
Fu, Fang-Wei [1 ,2 ]
机构
[1] Nankai Univ, Chern Inst Math, Tianjin 300071, Peoples R China
[2] Nankai Univ, LPMC, Tianjin 300071, Peoples R China
基金
中国国家自然科学基金;
关键词
Cheating immune; Visual cryptography scheme; Random grid; Threshold; Rotation; Secret sharing; PREVENTION; ENCRYPTION;
D O I
10.1007/s11042-021-11692-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since Noar and Shamir introduced visual cryptography scheme (VCS), the cheating problem of VCS has absorbed much attention of scholars. The current researches on cheating immune have one or more of these serious disadvantages: (1) each share has extra pixel expansion, (2) some methods need extra verification shares to determine the share is genuine or not, (3) some schemes require a higher encryption/decryption overhead, and (4) the authentication procedure needs a trusted third party. In order to establish a novel cheating immune visual cryptography scheme (CIVCS) without pixel expansion, this paper generates n original shares by using random grid based visual cryptography scheme (RG-based VCS) and stamps authentication patterns on original shares to obtain verifiable shares, where the authentication patterns are three adjacent and non-intersect concentric solid black rings. In authentication phase, the authentication patterns can be revealed respectively by stacking any two verifiable shares in several ways, including rotating one of the two shares by 90 degrees, 180 degrees, and 270 degrees counterclockwise. The main contribution of this paper is that we propose a novel CIVCS without the above deficiencies. Furthermore, experimental results and theoretical proofs are provided for illustrating the effectiveness of the proposed CIVCS.
引用
收藏
页码:6235 / 6257
页数:23
相关论文
共 49 条
  • [1] A cheating immune (k, n) visual cryptography scheme by using the rotation of shares
    Yongkang Zhao
    Fang-Wei Fu
    Multimedia Tools and Applications, 2022, 81 : 6235 - 6257
  • [2] Cheating immune visual cryptography scheme
    Liu, F.
    Wu, C.
    Lin, X.
    IET INFORMATION SECURITY, 2011, 5 (01) : 51 - 59
  • [3] Cheating Prevention in Visual Cryptography using Steganographic Scheme
    Jana, Biswapati
    Mallick, Madhumita
    Chowdhuri, Partha
    Mondal, Shyamal Kumar
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON ISSUES AND CHALLENGES IN INTELLIGENT COMPUTING TECHNIQUES (ICICT), 2014, : 706 - 712
  • [4] On (k, n)*-visual cryptography scheme
    S. Arumugam
    R. Lakshmanan
    Atulya K. Nagar
    Designs, Codes and Cryptography, 2014, 71 : 153 - 162
  • [5] On (k, n)*-visual cryptography scheme
    Arumugam, S.
    Lakshmanan, R.
    Nagar, Atulya K.
    DESIGNS CODES AND CRYPTOGRAPHY, 2014, 71 (01) : 153 - 162
  • [6] Cheating immune k-out-of-n block-based progressive visual cryptography
    Yang, Ching-Nung
    Lin, Yi-Chin
    Li, Peng
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 55
  • [7] Construction of a (k, n)-visual cryptography scheme
    R. Lakshmanan
    S. Arumugam
    Designs, Codes and Cryptography, 2017, 82 : 629 - 645
  • [8] Construction of a (k, n)-visual cryptography scheme
    Lakshmanan, R.
    Arumugam, S.
    DESIGNS CODES AND CRYPTOGRAPHY, 2017, 82 (03) : 629 - 645
  • [9] Implementation K out of N Visual Cryptography using K out of K Scheme
    Hasnat, Abul
    Barman, Dibyendu
    Mandal, Satyendra Nath
    2017 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2017,
  • [10] Cheating Immune Block-Based Progressive Visual Cryptography
    Yang, Ching-Nung
    Lin, Yi-Chin
    Wu, Chih-Cheng
    DIGITAL-FORENSICS AND WATERMARKING, IWDW 2013, 2014, 8389 : 95 - 108