On the Robustness of Visual Cryptographic Schemes

被引:2
作者
Dutta, Sabyasachi [1 ]
Roy, Partha Sarathi [2 ]
Adhikari, Avishek [1 ]
Sakurai, Kouichi [2 ]
机构
[1] Univ Calcutta, Dept Pure Math, Kolkata, India
[2] Kyushu Univ, Fac Informat Sci & Elect Engn, Fukuoka, Japan
来源
DIGITAL FORENSICS AND WATERMARKING, IWDW 2016 | 2017年 / 10082卷
关键词
Basis matrices; Robustness; Deterministic cheating; Visual cryptography; GENERAL ACCESS STRUCTURES; CHEATING PREVENTION; SECRET; IMAGES;
D O I
10.1007/978-3-319-53465-7_19
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we consider the robustness of a special type of secret sharing scheme known as visual cryptographic scheme in which the secret reconstruction is done visually without any mathematical computation unlike other secret sharing schemes. Initially, secret sharing schemes were considered with the presumption that the corrupted participants involved in a protocol behave in a passive manner and submit correct shares during the reconstruction of secret. However, that may not be the case in practical situations. A minimal robust requirement, when a fraction of participants behave maliciously and submit incorrect shares, is that, the set of all shares, some possibly corrupted, can recover the correct secret. Though the concept of robustness is well studied for secret sharing schemes, it is not at all common in the field of visual cryptography. We, for the first time in the literature of visual cryptography, formally define the concept of robustness and put forward (2, n)-threshold visual cryptographic schemes that are robust against deterministic cheating. In the robust secret sharing schemes it is assumed that the number of cheaters is always less than the threshold value so that the original secret is not recovered by the coalition of cheaters only. In the current paper, We consider three different scenarios with respect to the number of cheaters controlled by a centralized adversary. We first consider the existence of only one cheater in a (2, n)-threshold VCS so that the secret image is not recovered by the cheater. Next we consider two different cases, with number of cheaters being greater than 2, with honest majority and without honest majority.
引用
收藏
页码:251 / 262
页数:12
相关论文
共 22 条
  • [1] Adhikari A, 2004, LECT NOTES COMPUT SC, V3348, P399
  • [2] Adhikari A, 2004, IEICE T FUND ELECTR, VE87A, P1198
  • [3] Applications of partially balanced incomplete block designs in developing (2, n) visual cryptographic schemes
    Adhikari, Avishek
    Bose, Mausumi
    Kumar, Dewesh
    Roy, Bimal
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2007, E90A (05) : 949 - 951
  • [4] Linear algebraic techniques to construct monochrome visual cryptographic schemes for general access structure and its applications to color images
    Adhikari, Avishek
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2014, 73 (03) : 865 - 895
  • [5] On (k, n)*-visual cryptography scheme
    Arumugam, S.
    Lakshmanan, R.
    Nagar, Atulya K.
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2014, 71 (01) : 153 - 162
  • [6] Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
  • [7] Blakley G. R., 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK), P313, DOI 10.1109/MARK.1979.8817296
  • [8] Contrast optimal threshold visual cryptography schemes
    Blundo, C
    D'Arco, P
    De Santis, A
    Stinson, DR
    [J]. SIAM JOURNAL ON DISCRETE MATHEMATICS, 2003, 16 (02) : 224 - 261
  • [9] Cevallos A, 2012, LECT NOTES COMPUT SC, V7237, P195, DOI 10.1007/978-3-642-29011-4_13
  • [10] Cheating Immune Threshold Visual Secret Sharing
    De Prisco, Roberto
    De Santis, Alfredo
    [J]. COMPUTER JOURNAL, 2010, 53 (09) : 1485 - 1496