A cheating immune (k, n) visual cryptography scheme by using the rotation of shares

被引:4
|
作者
Zhao, Yongkang [1 ,2 ]
Fu, Fang-Wei [1 ,2 ]
机构
[1] Nankai Univ, Chern Inst Math, Tianjin 300071, Peoples R China
[2] Nankai Univ, LPMC, Tianjin 300071, Peoples R China
基金
中国国家自然科学基金;
关键词
Cheating immune; Visual cryptography scheme; Random grid; Threshold; Rotation; Secret sharing; PREVENTION; ENCRYPTION;
D O I
10.1007/s11042-021-11692-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since Noar and Shamir introduced visual cryptography scheme (VCS), the cheating problem of VCS has absorbed much attention of scholars. The current researches on cheating immune have one or more of these serious disadvantages: (1) each share has extra pixel expansion, (2) some methods need extra verification shares to determine the share is genuine or not, (3) some schemes require a higher encryption/decryption overhead, and (4) the authentication procedure needs a trusted third party. In order to establish a novel cheating immune visual cryptography scheme (CIVCS) without pixel expansion, this paper generates n original shares by using random grid based visual cryptography scheme (RG-based VCS) and stamps authentication patterns on original shares to obtain verifiable shares, where the authentication patterns are three adjacent and non-intersect concentric solid black rings. In authentication phase, the authentication patterns can be revealed respectively by stacking any two verifiable shares in several ways, including rotating one of the two shares by 90 degrees, 180 degrees, and 270 degrees counterclockwise. The main contribution of this paper is that we propose a novel CIVCS without the above deficiencies. Furthermore, experimental results and theoretical proofs are provided for illustrating the effectiveness of the proposed CIVCS.
引用
收藏
页码:6235 / 6257
页数:23
相关论文
共 49 条
  • [41] Multiple video clips preservation using folded back audio-visual cryptography scheme
    Mukherjee, Imon
    Ganguly, Ritam
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (05) : 5281 - 5301
  • [42] Secure grayscale image communication using significant visual cryptography scheme in real time applications
    G. Selva Mary
    S. Manoj Kumar
    Multimedia Tools and Applications, 2020, 79 : 10363 - 10382
  • [43] Secure grayscale image communication using significant visual cryptography scheme in real time applications
    Selva Mary, G.
    Manoj Kumar, S.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (15-16) : 10363 - 10382
  • [44] A Secured One Time Password Authentication Technique using (3,3) Visual Cryptography Scheme
    Christiana, Abikoye Oluwakemi
    Oluwatobi, Akande Noah
    Victory, Garuba Ayomide
    Oluwaseun, Ogundokun Roseline
    3RD INTERNATIONAL CONFERENCE ON SCIENCE AND SUSTAINABLE DEVELOPMENT (ICSSD 2019): SCIENCE, TECHNOLOGY AND RESEARCH: KEYS TO SUSTAINABLE DEVELOPMENT, 2019, 1299
  • [45] (Server-Aided) Two-Party Multiplication of Encrypted Shares Using (k, n) Threshold Secret Sharing With N ≥ k Servers
    Kamal, Ahmad Akmal Aminuddin Mohd
    Iwamura, Keiichi
    IEEE ACCESS, 2021, 9 : 113117 - 113129
  • [46] Visual secret sharing scheme for (k, n) threshold based on QR code with multiple decryptions
    Song Wan
    Yuliang Lu
    Xuehu Yan
    Yongjie Wang
    Chao Chang
    Journal of Real-Time Image Processing, 2018, 14 : 25 - 40
  • [47] Visual secret sharing scheme for (k, n) threshold based on QR code with multiple decryptions
    Wan, Song
    Lu, Yuliang
    Yan, Xuehu
    Wang, Yongjie
    Chang, Chao
    JOURNAL OF REAL-TIME IMAGE PROCESSING, 2018, 14 (01) : 25 - 40
  • [48] A Novel (t, s, k, n) -Threshold Visual Secret Sharing Scheme Based on Access Structure Partition
    Liu, Zuquan
    Zhu, Guopu
    Wang, Yuan-Gen
    Yang, Jianquan
    Kwong, Sam
    ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2021, 16 (04)
  • [49] A Novel Method for Authentication Using Chaotic Behaviour of Chua's Oscillator in (n,k) Secret Shared Data Scheme for Secure Communication
    Sharma, Navneet
    Kumar, Pravindra
    Rai, Shireesh Kumar
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2023, 70 (05) : 2098 - 2105