Multi-factor cheating prevention in visual secret sharing by hybrid codebooks

被引:8
作者
Lin, Chih-Hung [1 ]
Chen, Tzung-Her [2 ]
Wu, Yan-Ting [2 ]
Tsao, Kai-Hsiang [2 ]
Lin, Kai-Siang [2 ]
机构
[1] Natl Chiayi Univ, Grad Inst Math & Sci Educ, Chiayi 621, Taiwan
[2] Natl Chiayi Univ, Dept Comp Sci & Informat Engn, Chiayi 600, Taiwan
关键词
Visual secret sharing; Cheating attack; Cheating prevention; Hybrid codebook; Multi-factor; Visual cryptography; Share image; (k; n); Codebook; CRYPTOGRAPHY;
D O I
10.1016/j.jvcir.2014.06.011
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Visual secret sharing, or the so-called visual cryptography, is a well-known scheme that encrypts a secret image into several meaningless share images, usually printed on transparencies, and decrypts as stacking some or all share images by the human visual system. More and more researches about visual secret sharing and its applications have been recently proposed. Unfortunately, the cheating attack in which malicious participants cheat the honest one(s) by forging a fake share image has existed. Since 2006, some cheating prevention schemes have been proposed but suffered from one or more disadvantages as follows: (1) maintaining extra share images used to verify the integrity of a share image prior to stacking, (2) introducing extra pixel expansion, (3) raising heavy computation cost, and (4) giving ambiguous cheating detection. In this paper, a multi-factor cheating-preventing scheme, aiming at exploiting the hybrid codebook to hide the additional verification images into the share images, has been proposed without suffering the above-mentioned deficiencies. Two-factor cheating-detection exploits the design of verification to both share images and stacked results to deter attackers' cheating. The experimental results demonstrate the proposed scheme is feasible. (C) 2014 Elsevier Inc. All rights reserved.
引用
收藏
页码:1543 / 1557
页数:15
相关论文
共 11 条
[1]  
Chen TH, 2008, INT J INNOV COMPUT I, V4, P3005
[2]  
De Prisco R, 2006, LECT NOTES COMPUT SC, V4116, P216
[3]   Threshold visual cryptography schemes with specified whiteness levels of reconstructed pixels [J].
Eisen, PA ;
Stinson, DR .
DESIGNS CODES AND CRYPTOGRAPHY, 2002, 25 (01) :15-61
[4]   Cheating in visual cryptography [J].
Horng, G ;
Chen, T ;
Tsai, D .
DESIGNS CODES AND CRYPTOGRAPHY, 2006, 38 (02) :219-236
[5]   Cheating prevention in visual cryptography [J].
Hu, Chih-Ming ;
Tzeng, Wen-Guey .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2007, 16 (01) :36-45
[6]  
Lu ZM, 2007, INT J INNOV COMPUT I, V3, P621
[7]   Efficient encryption of wavelet-based coded color images [J].
Martin, K ;
Lukac, R ;
Plataniotis, KN .
PATTERN RECOGNITION, 2005, 38 (07) :1111-1115
[8]  
Naor M., 1995, LECT NOTES COMPUTER, V950, P1, DOI [10.1007/BFb0053419, DOI 10.1007/BFB0053419]
[9]  
Tsai D. S., 2007, P 17 INF SEC C, P769
[10]   A cheating prevention scheme for binary visual cryptography with homogeneous secret images [J].
Tsai, Du-Shiau ;
Chen, Tzung-Her ;
Horng, Gwoboa .
PATTERN RECOGNITION, 2007, 40 (08) :2356-2366