An efficient XOR-based verifiable visual cryptographic scheme

被引:13
|
作者
Jia, Xingxing [1 ]
Wang, Daoshun [2 ]
Chu, Qimeng [1 ]
Chen, Zhenhua [3 ]
机构
[1] Lanzhou Univ, Sch Math & Stat, Lanzhou, Gansu, Peoples R China
[2] Tsinghua Univ, Sch Comp, Beijing, Peoples R China
[3] Xian Univ Sci & Technol, Sch Comp Sci & Technol, Xian, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Visual cryptography; Verifiable visual cryptographic scheme; Pixel expansion; CHEATING PREVENTION;
D O I
10.1007/s11042-018-6779-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Visual cryptographic (VC) schemes have been widely used in secure multimedia systems for data transmission and data storage. It divides a secret image into n random-seemingly share images printed on the transparencies. Superimposing the designed shares will display the recovered secret image which can be recognized by human visual system. It is very convenient to decode the secret since it requires no cryptographic knowledge and computation. However, there is a high chance for dishonest shareholders to present faked shares in the secret reconstruction phase, which would result in a huge damage to the honest shareholders. In this article, a secure approach to verify the cheating shares has been proposed to achieve fair reconstruction of the image secret. It is designed to share a verification image among the original shares of the XOR based VC scheme. It only increases pixel expansion by one to achieve the verification function. Cheating detection ability is attained by pairwise superimposing the shares so that any cheating behavior can be detected by the honest participant. The secret image is recovered and its recovered contrast becomes 1times of the original contrast where m denotes the pixel expansion of the original scheme. The verification image is probabilistically recovered and its recovered contrast is 12(m+1) Compared with traditional verifiable (k,n)-VC schemes against cheating, it overcomes the drawbacks such as requiring additional shares, additional large pixel expansion, or lower contrast. The experimental results show that the visual quality of the recovered secret image is as good as expected. The security analysis and comparative results based on various aspects of VC schemes demonstrate the better efficiency of the proposed approach over existing schemes.
引用
收藏
页码:8207 / 8223
页数:17
相关论文
共 50 条
  • [41] A contrast improved OR and XOR based (k, n) visual cryptography scheme without pixel expansion
    Zhao, Yongkang
    Fu, Fang-Wei
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2022, 82
  • [42] Deterministic extended visual cryptographic schemes for general access structures with OR-AND and XOR-AND operations
    Praveen Kanakkath
    Sethumadhavan Madathil
    Ramakrishnan Krishnan
    Multimedia Tools and Applications, 2019, 78 : 1315 - 1344
  • [43] Deterministic extended visual cryptographic schemes for general access structures with OR-AND and XOR-AND operations
    Kanakkath, Praveen
    Madathil, Sethumadhavan
    Krishnan, Ramakrishnan
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (02) : 1315 - 1344
  • [44] A Novel Visual Cryptographic Scheme For Improved Binary Image Quality
    Arya, K.
    Baiju, Rakhee
    Sreenarayanan, N. M.
    Lakshmi, M.
    Mohan, Nimisha
    Soumya, M. K.
    Aswathy, A. S.
    Reshmi, K. C.
    2016 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2016,
  • [45] VSBSIS: A verifiable SVD-based secret image sharing scheme for lossless and efficient reconstruction
    Maity, Krishnendu
    Mukhopadhyay, Susanta
    DISPLAYS, 2023, 78
  • [46] A self-verifiable computational visual cryptographic protocol for secure two-dimensional image communication
    Mary, G. Selva
    Kumar, S. Manoj
    MEASUREMENT SCIENCE AND TECHNOLOGY, 2019, 30 (12)
  • [47] A new black and white visual cryptographic scheme for general access structures
    Adhikari, A
    Dutta, TK
    Roy, B
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2004, PROCEEDINGS, 2004, 3348 : 399 - 413
  • [48] Minimizing Pixel Expansion in Visual Cryptographic Scheme for General Access Structures
    Shyu, Shyong Jian
    Chen, Ming Chiang
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2015, 25 (09) : 1557 - 1561
  • [49] Optimal visual cryptographic scheme with multiple share creation for multimedia applications
    Geetha, P.
    Jayanthi, V. S.
    Jayanthi, A. N.
    COMPUTERS & SECURITY, 2018, 78 : 301 - 320
  • [50] Multiple share creation based visual cryptographic scheme using diffusion method with a combination of chaotic maps for multimedia applications
    P. Geetha
    V. S. Jayanthi
    A. N. Jayanthi
    Multimedia Tools and Applications, 2019, 78 : 18503 - 18530