Cheating Prevention in Visual Cryptography using Steganographic Scheme

被引:0
作者
Jana, Biswapati [1 ]
Mallick, Madhumita [1 ]
Chowdhuri, Partha [1 ]
Mondal, Shyamal Kumar [2 ]
机构
[1] Vidyasagar Univ, Dept Comp Sci, Paschim Medinipur, India
[2] Vidyasagar Univ, Dept Appl Math Oceanol & Comp Programming, Paschim Medinipur, India
来源
PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON ISSUES AND CHALLENGES IN INTELLIGENT COMPUTING TECHNIQUES (ICICT) | 2014年
关键词
cheating prevention; cheating; secret sharing; visual cryptography; steganography;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Visual Cryptography (VC) is a technique to encrypt a secret image into transparent shares such that stacking a sufficient number of shares reveals the secret image without any computation. Cheating is possible in the Visual Cryptographic Schemes (VCS) by dishonest or malicious participant called a cheater, may provide a Fake Share (FS) to cheat the other participants. To achieve cheating prevention in VC we have proposed a steganographic scheme to embed a secret message in each of the shares in random location during share generation phase called stego share. Before stacking receiver can extract hidden message from stego share for cheacking authentication of shares. In this method no verification share is required to prevent cheating in VC.
引用
收藏
页码:706 / 712
页数:7
相关论文
共 11 条
  • [1] [Anonymous], 2001, PROC INFORM HIDING
  • [2] Visual cryptography for general access structures
    Ateniese, G
    Blundo, C
    DeSantis, A
    Stinson, DR
    [J]. INFORMATION AND COMPUTATION, 1996, 129 (02) : 86 - 106
  • [3] Biehl I., 1997, Information and Communications Security. First International Conference, ICIS '97. Proceedings, P61, DOI 10.1007/BFb0028462
  • [4] Chen Y.C., 2012, IEEE T IMAG IN PRESS
  • [5] Chen YC, 2011, VISUAL CRYPTOGRAPHY
  • [6] Cheating in visual cryptography
    Horng, G
    Chen, T
    Tsai, D
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2006, 38 (02) : 219 - 236
  • [7] Cheating prevention in visual cryptography
    Hu, Chih-Ming
    Tzeng, Wen-Guey
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2007, 16 (01) : 36 - 45
  • [8] Naor M, 1997, LECT NOTES COMPUT SC, V1294, P322
  • [9] Naor M., 1995, LECT NOTES COMPUTER, V950, P1, DOI [10.1007/BFb0053419, DOI 10.1007/BFB0053419]
  • [10] A new approach for visual cryptography
    Tzeng, WG
    Hu, CM
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2002, 27 (03) : 207 - 227