A Secure Visual Secret Checking of Meaningful Sharing Images

被引:2
作者
Chen, Chin-Ling [1 ]
Chen, Wen-Hu [2 ]
Chen, Chih-Cheng [3 ]
Lai, Yeong-Lin [3 ]
Tseng, Kuo-Kun [4 ]
机构
[1] Chaoyang Univ, Dept Comp Sci & Informat Engn, Taichung 41349, Taiwan
[2] Natl Chung Hsing Univ, Dept Comp Sci & Engn, Taichung 40227, Taiwan
[3] Chung Shan Med Univ, Dept Hlth Policy & Management, Taichung 40201, Taiwan
[4] ShenZhen Univ, Shenzhen Grad Sch, Harbin Inst Technol, Shenzhen 518055, Peoples R China
来源
APPLIED MATHEMATICS & INFORMATION SCIENCES | 2014年 / 8卷 / 05期
关键词
Visual cryptography; Visual secret checking; Pattern dithering; Information security; CRYPTOGRAPHY; SCHEMES; AUTHENTICATION; CONTRAST;
D O I
10.12785/amis/080528
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Visual secret checking refers to the superimposition of one key image and another public sharing image without auxiliary automated computation, in order to recognize the specified secret via human inspection. This paper achieves the goals of: guaranteeing that the related contents of a secret are not revealed after any public sharing image superimposition, confirming the accuracy of any public sharing image, and providing for the ease of management of various types of sharing images. When a user is outside of a computer environment, he/she can utilize the proposed method to discern the contents of the secret independently. Furthermore, the key image and all the sharing images have the same meaning, visible upon inspection, which allows for effective data management and classification. Through an exposition of the relevant theory, as well as experimentation, this paper provides evidence for the above claims.
引用
收藏
页码:2327 / 2335
页数:9
相关论文
共 21 条
[1]   Extended capabilities for visual cryptography [J].
Ateniese, G ;
Blundo, C ;
De Santis, A ;
Stinson, DR .
THEORETICAL COMPUTER SCIENCE, 2001, 250 (1-2) :143-161
[2]   On the contrast in visual cryptography schemes [J].
Blundo, C ;
De Santis, A ;
Stinson, DR .
JOURNAL OF CRYPTOLOGY, 1999, 12 (04) :261-289
[3]   Visual cryptography for grey level images [J].
Blundo, C ;
De Santis, A ;
Naor, M .
INFORMATION PROCESSING LETTERS, 2000, 75 (06) :255-259
[4]   A multiple-level visual secret-sharing scheme without image size expansion [J].
Chen, Yung-Fu ;
Chan, Yung-Kuan ;
Huang, Ching-Chun ;
Tsai, Meng-Hsiun ;
Chu, Yen-Ping .
INFORMATION SCIENCES, 2007, 177 (21) :4696-4710
[5]   Friendly progressive visual secret sharing [J].
Fang, Wen-Pinn .
PATTERN RECOGNITION, 2008, 41 (04) :1410-1414
[6]  
Fang WP, 2009, INT J COMPUT SCI NET, V9, P204
[7]   Visual secret sharing for multiple secrets [J].
Feng, Jen-Bang ;
Wu, Hsien-Chu ;
Tsai, Chwei-Shyong ;
Chang, Ya-Fen ;
Chu, Yen-Ping .
PATTERN RECOGNITION, 2008, 41 (12) :3572-3581
[8]   Contrast-optimal k out of n secret sharing schemes in visual cryptography [J].
Hofmeister, T ;
Krause, M ;
Simon, HU .
THEORETICAL COMPUTER SCIENCE, 2000, 240 (02) :471-485
[9]  
Hou YC., 2001, J TECHNOLOGY, V16, P595
[10]   Hidden digital watermarks in images [J].
Hsu, CT ;
Wu, JL .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1999, 8 (01) :58-68