PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Preventing Cheating in Computational Visual Cryptography

Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Visual Cryptography (VC) has drawn much attention for providing the service of secret communication. Basically, VC is the process of encoding a secret into several meaningless shares and later decoding the secret by superimposing all or some of the shares without any computation involved. VC has been adopted to support some practical applications, such as image authentication, visual authentication, image hiding, and digital watermarking. Unfortunately, in many applications, VC has been shown to suffer from the "cheating problem" in which the disclosed secret image may be altered by malicious insiders who are called "cheaters." While ubiquitous computing has been well developed, it has recently occurred to people in both academia and industry that research could benefit more from computational VC by introducing light-weight computation costs in the decoding phase. In this paper, a simple scheme is proposed to conquer the cheating problem by facilitating the capability of share authentication. It is worthwhile to note that the proposed scheme can identify for certain whether cheating attacks have occurred or not, while other schemes that have the same objective frequently provide a vague answer. In addition, the proposed scheme effectively addresses the two main problems of VC, i.e., the inconvenience of meaningless share management and the challenge of achieving difficult alignment.
Wydawca
Rocznik
Strony
27--42
Opis fizyczny
Bibliogr. 18 poz., rys., tab., wykr.
Twórcy
autor
autor
autor
  • Department of Computer Science and Information Engineering, National Chiayi University, Taiwan, R.O.C., thchen@mail.ncyu.edu.tw
Bibliografia
  • [1] M. Naor and A. Shamir: Visual cryptography, Proceedings of Advances in Cryptology-EUROCRYPT'94, Lecture Notes in Computer Science, No.950, pp.1-12, Springer-Verlag, 1995.
  • [2] R. Lukac, K. N. Plataniotis: Bit-level based secret sharing for image encryption, Pattern Recognition, vol. 38, no. 5, pp. 767-772, 2005,
  • [3] S.-J. Shyu: Image encryption by random grids, Pattern Recognition, vol. 40, no. 3, pp. 1014-1031, 2007.
  • [4] M. Naor and B. Pinkas:Visual authentication and identification, Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology, Lecture Notes in Computer Science, Vol. 1294, Santa Barbara, California, USA, pp. 322-336, 1997
  • [5] T.-H. Chen, and D.-S. Tsai: Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol, Pattern Recognition, vol. 39, no. 8, pp. 1530-1541, 2006.
  • [6] C.-C. Chang, J.-C. Chuang and P.-Y. Lin: Sharing a secret two-tone image in two gray-level images, Proceedings of the 11th International Conference on Parallel and Distributed Systems, vol. 2, pp. 300-304, 2005.
  • [7] W.-P. Fang and J.-C. Lin: Visual cryptography with extra ability of hiding confidential data, Journal of Electronic imaging, vol. 15, no. 2, 023020, 2006.
  • [8] C.-S. Tsai, C.-C. Chang, and T.-S. Chen: Sharing multiple secrets in digital images, The Journal of Systems and Software, vol. 64, pp. 163-170, 2002.
  • [9] C.-C. Chang and J.-C. Chuang: An image intellectual property protection scheme for gray-level images using visual secret sharing strategy, Pattern Recognition Letters, vol. 23, pp. 931-941, 2002.
  • [10] S.-J. Lin, J.-C. Lin:VCPSS: A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches, Pattern Recognition, vol. 40, no. 12, pp. 3652-3666, 2007.
  • [11] D. Jin, W.Q. Yan, and M.S. Kankanhalli: Progressive color visual cryptography, Journal of Electronic Imaging, vol. 14033019, 2005.
  • [12] G. Horng, T.-H. Chen, and D.-S. Tsai: Cheating in visual cryptography, Designs, Codes, Cryptography, vol. 38, no. 2, pp. 219-236, 2006.
  • [13] C.-M. Hu and W.-G. Tzeng: Cheating prevention in visual cryptography, IEEE Transactions on Image Processing, vol. 16, no. 1, pp. 36-45, 2007.
  • [14] D.-S. Tsai, T.-H. Chen and G. Horng: A cheating prevention scheme for binary visual cryptography with Homogeneous secret images, Pattern Recognition, vol. 40, no. 8, pp. 2356-2366, 2007.
  • [15] D.-S Tsai and G. Horng: Cheating in visual cryptography revisited, Proceedings of 17th Information Security Conference, Chiayi, Taiwan, June 8, 2007.
  • [16] M. Naor and B. Pinkas: Visual authentication and identification, Proceedings of Advances in Cryptology, Lecture Notes in Computer Science, vol. 1294, no., pp. 322-336, 1997.
  • [17] T.-H. Chen, C.-S. Wu, and W.-B. Lee: A novel subliminal channel found in visual cryptography and its application to image hiding, Proceedings of the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP07), Kaohsiung City, Taiwan, November 26-28, 2007.
  • [18] I. Pitas: A method for signature casting on digital images, Proceedings of International Conference on Image Processing, ICIP 96, vol. 3, 1996.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BUS8-0004-0062
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.