Security analysis of authentication of images using recursive Visual Cryptography

被引:7
|
作者
Yang, Ching-Nung [1 ]
Chen, Tse-Shih [1 ]
机构
[1] Natl Dong Hwa Univ, Dept Comp Sci & Informat Engn, Hualien, Taiwan
关键词
authentication; recursive VCS (RVCS); secret sharing scheme; Visual Cryptography Scheme (VCS);
D O I
10.1080/01611190701869669
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Visual Cryptography Scheme (VCS) is a perfect secure method that encrypts a secret image by breaking it into shared images. The benefit and uniqueness of VCS is the easy decoding without the help of hardware and complex computation. In [2], Gnanaguruparan and Kak designed a recursive VCS (RVCS) to enhance the embedding information efficiency of the secret near 100% by recursively hiding the secret images. Also, an authentication of images using RVCS was proposed. In this article, we look closely at this authentication of images. Our experimental results show that the scheme will leak out the secret information.
引用
收藏
页码:131 / 136
页数:6
相关论文
共 50 条
  • [1] Facial Images Authentication In Visual Cryptography Using Sterilization Algorithm
    Dalvi, Gopal D.
    Wakde, D. G.
    2017 2ND INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2017, : 951 - 955
  • [2] Security and Privacy for Medical Images Using Chaotic Visual Cryptography
    Abdul, Wadood
    Ali, Zulfiqar
    Ghouzali, Sanaa
    Alsulaiman, Mansour
    JOURNAL OF MEDICAL IMAGING AND HEALTH INFORMATICS, 2017, 7 (06) : 1296 - 1301
  • [3] User Authentication using Visual Cryptography
    Kumar, Praveen P.
    Sabitha, S.
    2015 INTERNATIONAL CONFERENCE ON CONTROL COMMUNICATION & COMPUTING INDIA (ICCC), 2015, : 647 - 652
  • [4] On the security of a visual cryptography scheme for color images
    Leung, Bert W.
    Ng, Felix Y.
    Wong, Duncan S.
    PATTERN RECOGNITION, 2009, 42 (05) : 929 - 940
  • [5] A LOSSLESS WATERMARKING USING VISUAL CRYPTOGRAPHY AUTHENTICATION
    Wang, Yuh-Rau
    Lin, Wei-Hung
    Yang, Ling
    PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS (ICMLC), VOLS 1-4, 2013, : 1109 - 1113
  • [6] Security Analysis of Authentication Protocol for Mobile Devices Using Hyperelliptic Curve Cryptography
    Kordy, Turki
    Noor, Fazal
    Benrhouma, Oussama
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (10): : 91 - 100
  • [7] Multi-factor Authentication Using Recursive XOR-Based Visual Cryptography in Online Voting System
    Naidu, P. Sanyasi
    Kharat, Reena
    SECURITY IN COMPUTING AND COMMUNICATIONS, SSCC 2016, 2016, 625 : 52 - 62
  • [8] Remote Multimodal Biometric Authentication using Visual Cryptography
    Kaur, Harkeerat
    Khanna, Pritee
    PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON COMPUTER VISION AND IMAGE PROCESSING, CVIP 2018, VOL 2, 2020, 1024 : 13 - 25
  • [9] Enabling secure authentication using fingerprint and visual cryptography
    Annappanavar, Sneha Manohar
    Chavan, Pallavi Vijay
    INTERNATIONAL JOURNAL OF BIOMETRICS, 2024, 16 (06) : 614 - 639
  • [10] Visual cryptography for gray scale images with enhanced security mechanisms
    Narayana, V. Lakshman
    Gopi, A. Peda
    TRAITEMENT DU SIGNAL, 2017, 34 (3-4) : 197 - 208