An efficient XOR-based verifiable visual cryptographic scheme

被引:13
|
作者
Jia, Xingxing [1 ]
Wang, Daoshun [2 ]
Chu, Qimeng [1 ]
Chen, Zhenhua [3 ]
机构
[1] Lanzhou Univ, Sch Math & Stat, Lanzhou, Gansu, Peoples R China
[2] Tsinghua Univ, Sch Comp, Beijing, Peoples R China
[3] Xian Univ Sci & Technol, Sch Comp Sci & Technol, Xian, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Visual cryptography; Verifiable visual cryptographic scheme; Pixel expansion; CHEATING PREVENTION;
D O I
10.1007/s11042-018-6779-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Visual cryptographic (VC) schemes have been widely used in secure multimedia systems for data transmission and data storage. It divides a secret image into n random-seemingly share images printed on the transparencies. Superimposing the designed shares will display the recovered secret image which can be recognized by human visual system. It is very convenient to decode the secret since it requires no cryptographic knowledge and computation. However, there is a high chance for dishonest shareholders to present faked shares in the secret reconstruction phase, which would result in a huge damage to the honest shareholders. In this article, a secure approach to verify the cheating shares has been proposed to achieve fair reconstruction of the image secret. It is designed to share a verification image among the original shares of the XOR based VC scheme. It only increases pixel expansion by one to achieve the verification function. Cheating detection ability is attained by pairwise superimposing the shares so that any cheating behavior can be detected by the honest participant. The secret image is recovered and its recovered contrast becomes 1times of the original contrast where m denotes the pixel expansion of the original scheme. The verification image is probabilistically recovered and its recovered contrast is 12(m+1) Compared with traditional verifiable (k,n)-VC schemes against cheating, it overcomes the drawbacks such as requiring additional shares, additional large pixel expansion, or lower contrast. The experimental results show that the visual quality of the recovered secret image is as good as expected. The security analysis and comparative results based on various aspects of VC schemes demonstrate the better efficiency of the proposed approach over existing schemes.
引用
收藏
页码:8207 / 8223
页数:17
相关论文
共 50 条
  • [31] Sharing Multiple Secrets in XOR-Based Visual Cryptography by Non-Monotonic Threshold Property
    Wu, Xiaotian
    An, Na
    Xu, Zishuo
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2023, 33 (01) : 88 - 103
  • [32] Optimization of XOR Visual Cryptography Scheme
    Shi, Lin
    Yu, Bin
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 297 - 301
  • [33] XOR Based Non-monotone t-(k, n)*-Visual Cryptographic Schemes Using Linear Algebra
    Dutta, Sabyasachi
    Adhikari, Avishek
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2014, 2015, 8958 : 230 - 242
  • [34] Cheating Immune Visual Cryptographic Scheme with Reduced Pixel Expansion
    Praveen, Kanakkath
    Sethumadhavan, M.
    PROGRESS IN ADVANCED COMPUTING AND INTELLIGENT ENGINEERING, PROCEEDINGS OF ICACIE 2016, VOLUME 1, 2018, 563 : 257 - 265
  • [35] Threshold Visual Cryptographic Scheme With Meaningful Shares
    Shyu, Shyong Jian
    IEEE SIGNAL PROCESSING LETTERS, 2014, 21 (12) : 1521 - 1525
  • [36] Results on (2, n) Visual Cryptographic Scheme
    Praveen, Kanakkath
    Sethumadhavan, M.
    SECURITY IN COMPUTING AND COMMUNICATIONS, 2014, 467 : 335 - 340
  • [37] A Verifiable Visual Cryptography Scheme Using Neural Networks
    Deng Yuqiao
    Song Ge
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 113 - 116
  • [38] A Master Share (2, n) XOR based Visual Cryptography Scheme by Random Grids
    Ahammed, Farzin T.
    Sulaiman, M. K.
    2015 INTERNATIONAL CONFERENCE ON CONTROL COMMUNICATION & COMPUTING INDIA (ICCC), 2015, : 528 - 533
  • [39] A verifiable multi-secret image sharing scheme using XOR operation and hash function
    Chattopadhyay, Arup Kumar
    Nag, Amitava
    Singh, Jyoti Prakash
    Singh, Amit Kumar
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (28-29) : 35051 - 35080
  • [40] A new visual cryptographic scheme using latin squares
    Adhikari, A
    Bose, M
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (05): : 1198 - 1202