Design a new visual cryptography for human-verifiable authentication in accessing a database

被引:0
作者
Ching-Nung Yang
Li-Zhe Sun
Xuehu Yan
Cheonshik Kim
机构
[1] National Dong Hwa University,Department of CSIE
[2] Harbin Institute of Technology,School of Computer Science and Technology
[3] Anyang University,Department of Digital Media Engineering
来源
Journal of Real-Time Image Processing | 2016年 / 12卷
关键词
Visual cryptography; Participant-specific visual cryptography; Visual authentication;
D O I
暂无
中图分类号
学科分类号
摘要
Visual cryptographic scheme (VCS) has an attractive property of decoding that can be performed directly by the human visual system without any computation. This novel stacking-to-see property of VCS can be secure and cheap used for visual authentication in accessing a data base. In this paper, we design a new participant-specific VCS (PSVCS) to extend the authentication scenario from a single-client authentication in VCS-based authentication schemes to a group of clients with specific threshold property. The proposed (t,k,n\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$t, k, n$$\end{document})-PSVCS, where t≤k≤n\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$t\, \le \,k \,\le\, n$$\end{document}, needs t\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$t$$\end{document} specific participants and other (k-t\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$k-t$$\end{document}) participants to decode the secret image. When compared with previous VCS-based authentication schemes, our PSVCS-based authentication can provide different privileges to clients and is more suitable for real environment.
引用
收藏
页码:483 / 494
页数:11
相关论文
共 50 条
[21]  
Yang CN(undefined)undefined undefined undefined undefined-undefined
[22]  
Lin PW(undefined)undefined undefined undefined undefined-undefined
[23]  
Shih HW(undefined)undefined undefined undefined undefined-undefined
[24]  
Kim C(undefined)undefined undefined undefined undefined-undefined
[25]  
Yang CN(undefined)undefined undefined undefined undefined-undefined
[26]  
Shih HW(undefined)undefined undefined undefined undefined-undefined
[27]  
Wu CC(undefined)undefined undefined undefined undefined-undefined
[28]  
Harn L(undefined)undefined undefined undefined undefined-undefined
[29]  
Hou YC(undefined)undefined undefined undefined undefined-undefined
[30]  
Quan ZY(undefined)undefined undefined undefined undefined-undefined