A new deterministic algorithm based cheating prevention scheme for Visual Cryptography

نویسندگان

  • Du-Shiau Tsai
  • Chang-Chin Huang
چکیده

In 1995, Naor and Shamir proposed the k-out-of-n Visual Cryptography scheme such that only more than or equal to k participants can visually recover the secret through superimposing their transparencies. In 2006, Horng et al. indicated that cheating is possible when some participants create forged transparencies to deceive the remaining participants. In 2007, Tsai et al. proposed another cheating prevention scheme which was redesigned and extended by Generic Algorithms. This scheme was shown more secure in comparison with previous cheating prevention schemes in the literature. However, the major limitation of it is the case when the secret image consists of much more white pixels than black pixels, the secret shared by Generic Algorithms could be decoded incorrectly. In this paper, a new scheme is given to solve the cheating problem without extra burdens by adopting multiple distinct secret images and Generic Algorithms. Finally, experimental results and security analysis demonstrate the feasibility of the proposed scheme.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the Security of a Cheating Immune Visual Secret Sharing Scheme

Visual Secret Sharing (VSS), first invented by Naor and Shamir, is a variant of secret sharing. In the literature, VSS schemes have many applications, including visual authentication and identification, steganography, and image encryption. Moreover, VSS schemes provide the secure services in communications. In 2010, De Prisco and De Santis deeply discussed the problem of cheating in VSS, gave t...

متن کامل

A Survey on Cheating Prevention with Verifiable Scheme

Visual Cryptographic technique has become an important field of study in modern cryptography. Visual cryptography (VC) has quite a few applications and some of them are authentication and identification, steganography, and image encryption. As the era demands the need of security and Visual Secret Sharing to resist cheating scenario is a Visual Cryptographic technique. VSS is simple as it is ea...

متن کامل

Survey of Cheating Prevention Techniques in Visual Cryptography

Visual cryptography (VC) is a technique of encoding a secret image into share images such that stacking a sufficient number of shares reveals the original secret image. Shares are generally presented in transparencies. So each participant holds a transparency. The original secret image is recovered after superimposing the transparencies one to other. Basically, the performance of visual cryptog...

متن کامل

A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cryptography using Image Processing

Visual cryptography (VC) is a method of encrypting a secret image into shares such that stacking a sufficient number of shares reveals the secret image. Shares are usually presented in transparencies. Each participant holds a transparency. In this paper, we studied the cheating problem in VC by malicious adversaries. We considered the attacks of malicious adversaries who may deviate from the sc...

متن کامل

Share Authentication based Cheating Prevention in Naor-Shamir’s Visual Cryptography

Visual cryptography (VC), first proposed by Naor and Shamir, is a variant of secret sharing with many applications, such as providing secure services in communications. In 2006, Horng et al. showed that VC is vulnerable to cheating attacks. They also presented two approaches to prevent cheating, namely share authentication and blind authentication. In this paper, we review some share authentica...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010