Design a new visual cryptography for human-verifiable authentication in accessing a database

被引:0
作者
Ching-Nung Yang
Li-Zhe Sun
Xuehu Yan
Cheonshik Kim
机构
[1] National Dong Hwa University,Department of CSIE
[2] Harbin Institute of Technology,School of Computer Science and Technology
[3] Anyang University,Department of Digital Media Engineering
来源
Journal of Real-Time Image Processing | 2016年 / 12卷
关键词
Visual cryptography; Participant-specific visual cryptography; Visual authentication;
D O I
暂无
中图分类号
学科分类号
摘要
Visual cryptographic scheme (VCS) has an attractive property of decoding that can be performed directly by the human visual system without any computation. This novel stacking-to-see property of VCS can be secure and cheap used for visual authentication in accessing a data base. In this paper, we design a new participant-specific VCS (PSVCS) to extend the authentication scenario from a single-client authentication in VCS-based authentication schemes to a group of clients with specific threshold property. The proposed (t,k,n\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$t, k, n$$\end{document})-PSVCS, where t≤k≤n\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$t\, \le \,k \,\le\, n$$\end{document}, needs t\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$t$$\end{document} specific participants and other (k-t\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$k-t$$\end{document}) participants to decode the secret image. When compared with previous VCS-based authentication schemes, our PSVCS-based authentication can provide different privileges to clients and is more suitable for real environment.
引用
收藏
页码:483 / 494
页数:11
相关论文
共 50 条
[1]  
Weir J(2010)A comprehensive study of visual cryptography Trans. DHMS V, LNCS 6010 70-105
[2]  
Yan W(1999)Image size invariant visual cryptography IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 82 2172-2177
[3]  
Kuwakado H(2004)New visual secret sharing schemes using probabilistic method Pattern Recogn. Lett. 25 481-494
[4]  
Tanaka H(2006)Probabilistic visual cryptography schemes Comput. J. 49 97-107
[5]  
Yang CN(2013)General constructions for threshold multiple-secret visual cryptography schemes IEEE Trans. Inform. Forensics Secur. 8 733-743
[6]  
Cimato S(2014)New extended visual cryptography schemes with clearer shadow images Inf. Sci. 271 246-263
[7]  
De Prisco R(2005)Ideal contrast visual cryptography schemes with reversing Inf. Process. Lett. 93 199-206
[8]  
De Santis A(2009)The alignment problem of visual cryptography schemes Des. Codes Cryptogr. 50 215-227
[9]  
Shyu SJ(2003)Visual cryptography for color image Pattern Recognit. 36 1619-1629
[10]  
Jiang HW(2013)Aspect ratio invariant visual cryptography by image filtering and resizing Pers. Ubiquit. Comput. 17 843-850