Cheating Prevention Method in Visual Cryptography by Using Random Grids

Article Preview

Abstract:

The traditional cheating prevention is usually based on visual cryptography (VC), in which the constructed image is bigger than the secret image because of the pixel expansion. In this paper, we studied the cheating problems in visual secret sharing (VSS) by random grids (RG) which can prevent the cheating activities with no pixel expansion. We considered the attacks of collusive cheaters who may deviate from the scheme in any way. We presented the cheating method and applied it on attacking existent n-out-of-n VSS scheme based on RG. Then we proposed one cheat-preventing scheme that can prevent the cheating activity upon.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1423-1428

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] A. Shamir, How to share a secret, Communications of the ACM 22 (1979) 612–613.

DOI: 10.1145/359168.359176

Google Scholar

[2] G.R. Blakley, Safeguarding cryptography keys, Proceedings of National Computer Conference, vol. 48, New York, USA, 1979, p.313–317.

Google Scholar

[3] O. Kafri, E. Keren, Encryption of pictures and shapes by random grids, Optics Letters 12 (6) (1987) 377–379.

DOI: 10.1364/ol.12.000377

Google Scholar

[4] S.J. Shyu, Image encryption by random grids, Pattern Recognition 40 (3) (2007) 1014–1031.

DOI: 10.1016/j.patcog.2006.02.025

Google Scholar

[5] S.J. Shyu, Visual multiple-secret sharing by circle random grids, Imaging Sciences 4 (3) (2010) 926–953.

DOI: 10.1137/080722023

Google Scholar

[6] T.H. Chen, Visual secret sharing by random grids revisited , Pattern Recognition 42 (2009) 2203–2217.

DOI: 10.1016/j.patcog.2008.11.015

Google Scholar

[7] G. Horng, T.H. Chen, and D.S. Tsai. Cheating in visual cryptography, designs, codes and cryptography, , Vol. 38, No. 2 (2006) 219–236.

DOI: 10.1007/s10623-005-6342-0

Google Scholar

[8] H. Yan, Z. Gan, and K. Chen, A cheater detectable visual cryptography scheme, (in Chinese) J. Shanghai Jiao tong Univ., vol. 38, no. 1, (2004).

Google Scholar

[9] G. -B. Horng, T. -G. Chen, and D. -S. Tsai, Cheating in visual cryptography, Designs, Codes, Cryptog., vol. 38, no. 2, p.219–236, (2006).

DOI: 10.1007/s10623-005-6342-0

Google Scholar

[10] M. Naor and B. Pinkas, Visual authentication and identification, in Proc. Advances in Cryptology, 1997, vol. 1294, LNCS, p.322–336.

Google Scholar

[11] C. -N. Yang and C. -S. Laih, Some new types of visual secret sharing schemes, in Proc. Nat. Computer Symp., 1999, vol. 3, p.260–268.

Google Scholar

[12] C.M. Yang and W.G. Tzeng, Cheating prevention in visual cryptography, IEEE transactions on image processing, vol. 16, NO. 1, January (2007).

Google Scholar

[13] D.S. Tsai, T.H. Chen and G. Horng, A cheating prevention scheme in binary visual cryptography with homogeneous secret image, Pattern Recognition, Vol. 40 No. 8, 2007, pp.2356-2366.

DOI: 10.1016/j.patcog.2007.01.013

Google Scholar

[14] D. De Prisco and A. De Santis, Cheating immune threshold scheme visual secret sharing, The Computer Journal, doi. 10. 1093/comjnl/bxp098.

DOI: 10.1093/comjnl/bxp068

Google Scholar

[15] Y.C. Chen, G. Horng and D.S. Tsai, Cheating prevention in visual cryptography , Visual cryptography and secret image sharing, pp.281-296.

DOI: 10.1201/b11068-19

Google Scholar