Cheating Prevention in Visual Cryptography : A survey , Sayali Gapate

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume 25 Number 2- July 2015
Cheating Prevention in Visual Cryptography : A survey
Sayali Gapate#1, Prof. Jyoti Rao*2
#
Department of Computer Engg, DYPIET, Pimpri,
Savitribai Phule Pune University,Pune, India.
Abstract—For preserving the security of data there
has been tremendous research areas evolved and explored
since few years. Cryptography is seen to be the dominant
strategy in the information security domain. To
differentiate
security
of multimediadata, visual
cryptography is seen as the prominent way for data
confidentiality and secrecy of information being
distributed.
The mechanism of visual cryptography is widely used
approach which encrypts the secrete image into the many
meaningless share images and decodes by stacking some
or all shares by human visual system. There are many
methods presented for visual cryptography with their own
advantages and disadvantages.. Over the years , in visual
cryptography the scope of research mainly focused on
developing techniques on grayscale , halftone , color
visual cryptography, region incrementing visual
cryptography, minimization of pixel expansion , multiple
secret sharing and cheating prevention in visual
cryptography.
Recently new cheating–preventing scheme has been
found whichis advantageous over a combined approach of
two general VC codebooks. This method resulted into
number of advantages such as computation cost is low;
multi factor cheating detection is involved etc. However,
we identified two research problems such as 1) there is no
efficient generic method of generating (k,n) codebooks
with minimizing the pixel expansion, 2) it is impractical
and time-consuming to stack three or four shares.
Therefore in this project our aim is to extend this hybrid
codebook based method with goal of overcoming above
two listed limitations. We are presenting the efficient
approach for codebooks generation with less timing
consuming while decryption.
Keywords—Contrast,Share,Stacking,Pixel expansion.
I.
INTRODUCTION
Even though the computer technology is advanced
and the efforts of computerizing every possible
systems available is nowadays current trend. Still
using computer to decrypt a secret is not feasible in
some situation. For example, at a highly influential
event a security guard checks for a badge of an invitee
or a secret agent reconstructs an urgent secret at some
distant place without aid of any electronic devices as
lack of such devices at that place used. In these
situations, human visual systems are one of the most
convenient and easy available tool to do checking and
secret recovery.
Secret sharing using visual cryptography is
different from typical cryptographic secret sharing
scheme. VSS allows each party to keep a portion of
ISSN: 2231-5381
secret and provides a way to know atleast part of the
secret. Encryption using multiple keys is a possible
solution. However this solution requires a large no. of
keys, resulting into troublesome management of no.
of keys.
This survey consists of the work done in this
area of cheating prevention, advantages and
disadvantages of literature aredone. Theproposed
work is comprises of insight of the scheme. This
paper also givesdiscussion of future work along with
the final conclusion.
II.
RELATED WORK
A. Traditional Visual Cryptography
Visual secret sharing also called as visual
cryptography is a popular technique used for
encrypting a secret by means of creating number of
meaningless shares which are distributed among
participants such that the decryption process is done
by stacking some or all of them to reveal the original
secret. The reconstructed secret is evident to human
eyes whether correct secret has been reconstructed
after stacking process. Thus no aid of complex
computations is needed. This visual secret sharing
technique was introduced in 1995 by Moni Naor and
Adi Shamir. A (k,n) VSS means that a secret image
is encoded into n shares and stacking any k or more
shares (k <= n ) can reconstruct the secret image.
The encryption problemis expressed as a k
out of n secret sharing problem. Given the image or
message, ntransparencies are generated so that the
original image (message) is visible if any k ofthem
are stacked together. The image remains hidden if
fewer than k transparenciesare stacked together. It
assumes that the image is a collection of black and
whitepixels, each pixel is handled individually and it
should be noted that the white pixelrepresents the
transparent color. One disadvantage of this is that the
decipheringprocess is lossy, resulting into contrast.
Later extended VC schemes presented using
general access structures generated the meaningful
shares from qualifying sets. The pixel expansion
problem occurred in extended VC scheme using
general access structure was solved by algorithm
proposed by Lee and Chiu
with addition of
meaningful cover image in each share, without
generating noisy pixels. This approach consists of
two phases. In the first phase, depending upon a
given access structure, meaningless shares are
constructed with the help of an optimization
technique. In the second phase, using stamping
algorithm the addition of cover images to each share
is done. The construction problem of VCS for general
http://www.ijettjournal.org
Page 96
International Journal of Engineering Trends and Technology (IJETT) – Volume 25 Number 2- July 2015
access structures is formulated as a mathematical
optimization
problem
being
solved
using
optimization techniques. They have developed a
hybrid method for EVCS constructions. Withthe use
of stamping algorithm, all present VC schemes can be
changed so that the extended VC schemes are
developed without redesigning codebooks. The
advantage of EVCS is the modularity. Each phase in
the encryption procedure maintained modularity thus
its easy to modify each phase clearly. Another
advantage is that as the density of the cover images is
adjustable, it is easy to modify the display quality of
the cover images. [2].
B. Basic concept of Cheating in Visual Cryptography
As it’s been crucial in today’s fastest computing
social era to keep data secure emerged as a major
concern. As it has been observed by researchers and
experts that information forgery is being done by
cheaters or attackers on all types of data (whether it is
image, text, videos, encrypted source and many
more). So as this, even visual secret sharing scheme
also detected cheating attack, this interests most of
the researchers to work on this area. Since 2006, there
has been huge work undergone in cheating prevention
in visual secret sharing.
The idea of cheating can be understood as when
intended malicious or dishonest participants cheat the
honest ones by giving fake share. According to (2,3)
scheme it can be seen in following figure:
The cheating in (2, 3) scheme is done by
manipulating the sub-pixels of the concerned shares
of participating. Manipulation of pixels indicates that
the white pixel of say participant is replaced by the
black pixel of that share. Such that when stacking is
done, the resultant pixel is different than the original
one. Because of such pixel manipulations the
resultant shares are generated which are vague and
ambiguous. In this way, cheating takes place, the idea
of how it is done can be seen from the following
figure.
Several papers have proposed to solve the
cheating problem. Horng et al. detected first cheating
attack and presented two methods to prevent the
dishonest participants (referred to as cheaters) collude
and want to cheat other participants, which are known
as cheating activity (CA). CA can affect
unpredictable damage to the participants; therefore
the honest participants accept a fake secret image
different from the actual authenticated secret image.
They designed two types of cheating prevention
techniques, share authentication and blind
authentication [3].
Figure 1:The example of cheating in (2, 3) VSS
Share authentication based :
By using the verification image authentication
process performed against all shares along with
malicious share, generated by the cheaters. However,
if the malicious share can pass the authentication, the
victim will accept the stacking result.
Blind authentication based :
With absence of verification image, the cheaters
found it difficult to predict the structure of the shares
of the other participants.
The cheating prevention schemes can be thus,
categorized as share authentication based and blind
authentication based as the schemes presented later
are mostly following these concepts.
C. Share authentication based
Horng et. al. claimed that cheating is possible in
(k, n)-VSS where k <n. The cheating activity of
Horng et. al. is that then cheaters collude to use their
transparencies to predict the secret and derive the
victim’s transparencies Tv, thus they can create a
fake transparencies FT to make the victim to accept
the cheating image by stacking FT + Tv.
They referred a (2, 3)-VSS scheme as an example.
A secret image is encrypted into three different
transparencies, denoted T1, T2 and T3. Then, the
three transparencies are distributed respectively to A,
B, and C. Participants A and B are assumed to
colluding cheaters and C is the victim. In cheating,
T1 and T2 collaborate to create forged transparency
T’2 such that stacking T ’2 and T3 will visually
reconstruct the cheating image. Exactly, by observing
the collections of 3×3 matrices are used to generate
transparencies, cheaters chose to use those matrices to
predict the exact structure of the victim’s
transparency so as to create T’2. For representing a
white pixel of cheating share, the block in T’2 is set to
have the same structure of T3. For representing a
black pixel of cheating share, the block in T’2 is set to
have the distinguished structure of T3.
Later, Hu and Tzeng presented three cheating
schemes and applied them for attacking all existent
VC or EVC schemes. They proposed a generic
ISSN: 2231-5381
http://www.ijettjournal.org
Page 97
International Journal of Engineering Trends and Technology (IJETT) – Volume 25 Number 2- July 2015
method which is derived from a VCS to another VCS
having the property of cheating prevention which is
share authentication based. After the fake share has
been stacked on the genuine share, the fake secret can
be viewed.
CA-1 and CA-2 are executed by a malicious
participant (MP) and a malicious outsider (MO),
respectively. MP or MO to set a cheating image and
creates FT(fake share) such that the stacking operation
of the victim’s transparency and FT reconstructs the
cheating image. In CA-1, with the MP’s transparency
T1, the MP can construct a fake set of shares using his
genuine share.
InCA-2, with the same scenario, the MO has
knowledge of the share construction, and it does not
keep any transparency. MO is capable of cheating the
VC scheme without having any knowledge of any
correct shares. But as MO is able to generate share
can create fake shares for stacking.
A new verifiable visual cryptography scheme
(VCS) for color image is presented by Han et.al.
which fulfils the distribution and recovery of the
secret image and verifiable image which is relied on
XOR algorithm. The distribution and reconstruction
of the secret image are done using the additive colour
model and the halftone technology respectively. The
presented scheme is simple and efficient. The visual
quality of recovered image is acceptable with the
VCS without incurring any pixel expansion and the
reconstruction of the verification image is clear
without any distortion.
To solve the problem of security, they have
introduced a verification image which is used for
distribution and reconstruction process. This scheme
is less complex with good security and attains the
gold of the optimization parameters. The recovered
secret image is possesses characteristics such as the
good contrast without pixel expansion, and the
recovered verifiable image is clear without distortion
using XOR algorithm for stacking the shares and
verification shares. The shares and the recovery secret
image are having the same size as that of the original
secret image without pixel expansion. Also, the
recovery verifiable images have the same size as of
the verifiable image without distortion.This scheme
introduces trusted third party (TTP) which is used to
validate the cheating activity of the participants [8].
Bin YU, Jin-Yuan LU, Li-Guo Fang stated
participants colluding are an important issue of
cheater
detectable
visual
cryptography
schemes(CCPVCS). Using trusted third party, a cocheating prevention visual cryptography scheme
(CCPVCS) is invented improving checking
efficiency. Checking efficiency is improved by
verifying the truth of several shares simultaneously,
with designed special verification shares. Since the
idea of the scheme is different from previous cheating
prevention schemes presented, the incurred pixel
expansion is less and the recovered secret image was
found to be good for viewing. Through they needed a
peculiar verification share and n optional verification
ISSN: 2231-5381
shares, to detect the truth of several shares
simultaneously. Not only co-cheating has been
prevented effectively, but also the improved checking
efficiency is the added advantage. However, the
number of verification shares which kept by the third
party is large. Thus, this gave scope for more research
to explore this area more.[9]
Qin Chen proposed (n, n) threshold visual
cryptography scheme for cheating prevention to
improve the generic transformation for cheating
prevention scheme (GTCP).The cheating problem in
the GTCP is analyzed, and presented the cheating
method that is applicable to attack on the GTCP.
Then they constructed the matrices for cheating
prevention having said following features: (a) each
participant can't gain any useful information from his
shares, (b) each pixel has the same number of black
and white sub pixels in the secret share and in the
verification share, (c) one's verification image will be
recovered by stacking of his verification share and the
secret share, (d) the secret image can be revealed by
stacking all the secret shares. The analysis showed
that our scheme can avoid cheating.[10]
P.Y. Lin and C.C. Chang presented cheating
resistant and reversibility oriented visual secret
sharing scheme in 2011. They provide a novel
scheme that confirmed to security essentials such as
detecting and identifying the cheater, the method of
secret sharing presented by the authors is reversible.
That is, only legitimate participants can reconstruct
the cover image without losing any information after
recovering the secret image. To reconstruct a
distortion-free cover image is an important concern
while the cover image is as much of importance as
those of the medical, military and artistic images.
Every bit of image possesses significant information
which is sensitive for the secret image. The
reversibility is applicable to the secret-sharing
mechanism for proven security and to uphold the
fidelity of important cover image..[13]
In 2012, Horng et. al. researched new
authentication based cheating prevention scheme with
Naor-Shamir’s VC scheme. The black patterns are
incorporated with verified stacking result. Ensuring
whether a share transparency is fake or not and with
less pixel expansion. Horng revisited some wellknown cheating activities and CPVSS schemes,
categorized cheating activities into meaningful
cheating, non-meaningful cheating, and meaningful
deterministic cheating. A new cheating prevention
schemes is observed to be secure against the
meaningful deterministic cheating, which does not
depend on additional shares and incur less pixel
expansion than previous schemes. The pixel
expansion problem in many of the VSS scheme is
denoted by m. Thus, Horng et. al. presented a new
ABCP scheme using specific verified patterns
claiming that it is cheating immune with
improvements against some drawbacks which are
seen in previous schemes. They came up with a new
authentication based cheating prevention scheme
which is constructed by referring Nair–Shamir’s 2-
http://www.ijettjournal.org
Page 98
International Journal of Engineering Trends and Technology (IJETT) – Volume 25 Number 2- July 2015
out-of-n visual cryptography. This scheme follows
the black patterns especially inserted into the
verification share. It prevents cheating by checking
the number of the black patterns used in transparency
to decide transparency is fake or not. If collusive
cheaters know the secret but they cannot randomly
modify a black region with a white region or a white
region with a black region, we can say this scheme is
cheating immune[11].
The pixel expansion problem in many of the VSS
scheme is denoted by m .Random grid (RG) approach
is used to solve the pixel expansion problem. Random
grid (RG) is an approach to solve pixel expansion
problem. However, the previous VSS methods using
RGs are tied to (2, n), (n, n) and (k, n) schemes.
Xiaotian Wu, Wei Sun presented RG-based VSS
schemes for general access structures. One secret
image is encrypted into n random grids using
qualified sets can recover the secret visually. Also, a
cheat preventing method is presented and is efficient
and giving scope for more complex sharing strategies
to research further. They have designed the capacity
of RG to develop VSS schemes for general access
structures. A cheating immune method is presented as
well to provide extra ability of cheat preventing for
RG-based VSS. They presented RG-based algorithms
to share a secret image for general access structures
and cheat preventing method are formulated.
Herein, by using the presented generic method to
transform a RG-based VSS into cheating immune
scheme to prevent the attacks found in earlier. The
proposed cheat-preventing method is based on
authentication. Each participant keeps one
verification share to check the validity of other
shares. Therefore, n verification images V 1,Vn are
required. Each verification image is selected by the
corresponding participant confidentially.
Each participant can check the validity of share
provided by other participant by stacking their own
verification share with the given share together. If the
given share is authenticated, then verification result
reveals the associated verification image. For
construction of verification share, there is a constraint
on the verification shares against the (2, n) collusion
cheating attack. The verification information should
not be set on the locations subsequent black areas of
the original secret image.
The presented algorithm can further extend to
applicable for sharing colour images using halftone
technique,
colour
composition
and
colour
decomposition. Specifically, error diffusion algorithm
is followed for colour images. [14].
D. Blind authentication based
The main concept of Hu-Tzeng’s scheme uses a
generic transformation to create new transparencies
with addition of two sub pixels in each block of each
original share. Then, this scheme generates a
verification transparency for each participant such
that the stacking result of the new transparency with
ISSN: 2231-5381
the verification transparency will reveal a verification
image. The scheme is a share authentication based
cheating prevention scheme, and it performs the
following steps with inputs S0 and S1 where S0 and
S1 are base matrices as the Nair–Shamir’s (k, n)-VSS
scheme. In the share verification phase of the secret
image, before stacking transparencies, each Pi uses
Vi +Tj to check his own verification image where Tj
is hold by participant Pj , where j represents the
identity of participant holding the verification share
and transparency.[4]
The two cheating prevention schemes presented
by Horng et al. as explained earlier suffered from
following disadvantages. One scheme requires extra
verification transparencies and the other needs larger
number of shares. Thus, a need of more secure
scheme having the cheating problem without extra
burdens by adopting multiple distinct secret images.
Tsai proposed a cheating prevention scheme in which
shares are generated by Genetic Algorithms using
qualified subset disclosing the appropriate
reconstructed secret image. Moreover, for sharing
these secret images simultaneously, the share
construction method of visual cryptography is
redesigned and extended by generic algorithms. The
security analysis shows that this scheme is secure as
compared with the earlier cheating prevention
schemes.
A more secure scheme is given to solve the
cheating attack observed in VCS is eliminating the
need of keeping extra transparencies by taking
multiple distinct secret images. Although, for sharing
the secret images at the same time, the share
generation method of visual cryptography is
redesigned and extended by generic algorithms with
provably secure scheme. This scheme avoids multiple
distinct secret images. In this way, it became a
multiple-objective optimization problem which can
be applicable for multiple secret images in k-out-of-n
scheme. The genetic algorithms (GA) to resolve the
multiple-objective optimization problem has became
an interest of many researchers. Because GA (1) has
less mathematical calculations regarding the
optimization problems, and is flexibility to combine
with different domain dependent heuristics to provide
an efficient implementation for a specific problem
.Moreover, the performance of GASCM is
improvised with regards to altering the initial
population with filtering constraint, crossover
operator with local search and mutation operator for
security[5].
De Prisco and De Santis came up with
development of two cheating immune visual secret
sharing schemes: one is simple scheme and the other
is better scheme. The simple scheme can be
applicable for (2, n)-VSS and (n, n)-VSS, where the
base matrices are C0 and C1. Each of C0 and C1 can
be partitioned into two parts: C1 and C2. Where as C1
is a column of all 0s. And C2 is set as Naor–Shamir’s
base matrix. They have also described a better (2, n)threshold scheme (for short, the better scheme). This
scheme illustrated that one pixel will be expanded to
http://www.ijettjournal.org
Page 99
International Journal of Engineering Trends and Technology (IJETT) – Volume 25 Number 2- July 2015
2n+ n + 1 sub pixels. The base matrices are
represented with C0 and C1. Each of them is
partitioned into three parts: C1, C2, andC3. Where, C1
contains all the possible 2n binary column vectors
having length n. C2column contains all 0s. C3 is set
with the Naor–Shamir’s base matrix. In this manner,
they prove that this is better scheme in cheating
prevention without a complementary image; hence,
for any black or white pixel, the cheaters cannot
derive the actual value of victim’s sub pixels.[6]
In 2012, Hsu et. al. presented a verifiable visual
cryptography (VC) scheme for verifying the validity
of the shares engaged in a VC decryption process.
The idea is to stamp a continuous pattern on the
shares of the same secret image, and apart of the
pattern can be reconstructed through aligning and
stacking half of two shares together. The visual
consistent among the reconstructed patterns of any of
the pairs of shares provides evidence to the
genuineness of the shares involved in the decryption
process. Compare to the earlier noted cheating
prevention VC schemes, this scheme maintainsthe
original pixel expansion in VC scheme without cheat
prevention ability, and the share verification process
is done without recurring to any additional
verification image. This scheme provided the
verification mechanism which can easily be attached
to any VC schemes in the literature to empower
authenticated users with the ability of cheating
prevention from forged participants.
This method is developed in order to prevent
authorized user from cheating by misleading secrets
provided by malicious users in VC schemes. With
given set of shares froma same secret image that can
be constructed using any reported VC scheme, a
verification pattern stamping process is developed to
stamp an authentication pattern on the created shares
to provide with the evidence of the genuineness of the
shares. It follows the same procedure as those used
for the decoding process of a typical VC schemes, the
secret information contained in the secret image can
be revealed by fully stacking and aligning any subset
of qualified shares. Also, by aligning and stacking
half of two consecutive shares displays a part of the
verification pattern, and the consistent among the
reconstructed patterns provides the evidence about
the genuineness of the shares involved in the
decryption process. Thus, this scheme becomes
efficient yet simple. It can easily be adopted by many
of the VC schemes to avail the cheat preventing
ability against the forged intenders.[7].
In 2013, Horng et. al. revisited some well known
cheating prevention schemes present in literature of
cheating prevention and, then categorize cheating
activities into meaningful cheating, non-meaningful
cheating, and meaningful deterministic cheating.
Moreover, they analyze the research challenges in
CPVSS, and proposed a new cheating prevention
scheme which is better than the previous schemes in
the aspects of some security requirements.
Meaningful cheating:
ISSN: 2231-5381
The cheaters create a cheating image, and their
intention is generating fake shares and making the
victim to accept the reconstructed cheating image.
However, the cheaters have to modify pixel blocks,
which can be observed by human’s vision. Horng et.
al.’s CA, CA-1, and CA-2 are found as meaningful
cheating.
Non-meaningful cheating:
The cheaters do not set a cheating image, and
their goal is to generate fake shares then make them
acceptable by participants to accept the cheating
image.
The new proposed scheme by Horng et.al. does
not rely on the verification shares. The concept of this
scheme is that a verifiable message finalized by a
participant say Pi is added into the stacking result of
Ti+Tj (i=j) ; without affecting the secret, and Pi can
validate whether Tj is fake or not from the stacking
result of Ti+Tj. This scheme is designed with the two
phases namely, share construction phase and share
recovery phase.[12]
Chih-Hung Lin presented a new cheating general
VC codebooks. With the design of hybrid codebook,
the verification images are abstracted in the shares to
check against the intended share, whether it is fake or
not. Thus, the cheating attacks can be detected. This
scheme has following advantages over the other
schemes presented so far: (i) need of keeping extra
share to check the validity of the other shares is
eliminated, (ii) the computation cost is low, and (iii)
multi-factor cheating detection is involved. The cons
for this scheme as follows: the codebook design of
VC is case-by-case, no efficient generic method of
generating (k, n) codebooks minimizing the pixel
expansion. This gives rise to design of two-factor VC
scheme with cheating prevention into case by case
design reducing time spend on stacking
transparencies[15].So, the proposed system is
focusing on this issues to be resolved with the
efficient cheating detection and prevention process.
For this system, the proposed hybrid codebook
design, such that any two shares can be used to
reconstruct the original secret and verification image.
Unlike previous techniques which were dealing with
creating separate verification shares and the shares
for participating entities using any of the codebooks,
the codebook design was the major part which used
to encrypt both the secret and to hide the verification
shares itself into the generating shares. The hybrid
codebook was designed such that the two codebooks
(2, 2) and (2, 3) were combined for encryption
process.
The concept of verification image in this system is
used for checking the validity of the shares. Any two
shares can reconstruct the verification image by
shifting the generic shares in different locations to hid
the verification images into it . Hence, this system
can detect fake shares. This hidden verification
images itself in the generic created shares removes
the need of maintaining extra verification shares with
http://www.ijettjournal.org
Page 100
International Journal of Engineering Trends and Technology (IJETT) – Volume 25 Number 2- July 2015
the low computational costs. This system does well
work when cheating attack occurred by giving result
of ambiguous secret shares and verification shares
with the double-check proof by giving the ambiguous
result of verification image.
The performance of the proposed cheatingprevention schemeis evaluated on the basis of
detection ability, computation cost, contrastand
security.
TABLE I.
COMPARISON OF DIFFERENT PERFORMANCE
FACTORS
Sr.
No
.
1.
2.
3.
Authors
Extra
share
Pixel
expansion
Com
putation
cost
Chea
ting
preve
ntion
Authentication Based
Blind
Authenticatio
n
YES
2(n)
Low
YES
NO
2(n +l)
Low
YES
Hu
and
Tzeng(200
7)
Authentication Based
YES
Tsai
et
al.[2007]
Blind
Authenticatio
n
YES
Blind
Authenticatio
n
NO
2(n
1)
+
Low
YES
Blind
Authenticatio
n
NO
2n þ n
þ1
Low
YES
Horng
et
al.(2006)
4.
De Prisco
and
De
Santis[2010
]
.
.6
Technique
Applied
III.
In this paper various cheating prevention schemes
in visual cryptography are studied and their
performance is evaluated on four criteria: extra share,
pixel expansion, computational cost and cheat
preventing ability. The categorization of cheating
prevention is mainly done on the basis of two
techniques share authentication based and blind
authentication based depending on the presence of
extra verification shares. All cheating prevention
schemes have been categorized in these two
techniques to evaluate the cheat preventing ability.
REFERENCES
[1]
[2]
[3]
2(n +2)
Low
NO
[4]
[5]
2× 2
High
YES
[6]
[7]
[8]
[9]
2
n-1
Qin Chen,
Wen-Fang
Pengo Min
Zhang, YiPing
Chu(2010)
Generic
transformatio
n
YES
Low
7.
Y.C.Chen,
G. Horng,
D.S.Tsai(2
012)
Authentication Based
YES
2n
Low
YES
.9
Xiaotian
Wu, Wei
Sun(2012)
Authentication Based
YES
1
Low
YES
YES
Chih-Hung
Lin et al
(2014)
Both
NO
[10]
[11]
[12]
10
ISSN: 2231-5381
[13]
2× 2
Low
YES
CONCLUSION
[14]
M. Naor and A. Shamir, “Visual cryptography,― in
Advances in Cryptology, vol. 950. New York, NY, USA:
Springer-Verlag, 1995, pp. 1-12
KH Lee, PL Chiu.: An Extended Visual Cryptography
Algorithm for General Access Structures. IEEE Transactions
on Information Forensics and Security vol. 7, no. 1, (2012)
Stelvio Cimato,Ching-Nung Yang: Visual Cryptography and
Secret Image Sharing, Taylor & Francis Group, 2012 LLC
Hu, C.M., Tzeng W.G.: Cheating prevention in visual
cryptography. IEEE Transactions on Image Processing 16(1),
36-45 (2007)
D.S. Tsai, T.H. Chen, and G. Horng. A cheating prevention
scheme for binary visual cryptography with homogeneous
secret images, Pattern Recognition, Vol. 40 No. 8, 2007, pp.
2356{2366.
R. De Prisco, A. De Santis, Cheating immune threshold
visual secret sharing,Comput. J. 53 (9) (2010) 1485–1496.
Shuo-Fang Hsu ; Yu-Jie Chang ; Ran-Zan Wang ; YeuanKuen Lee ; Shih-Yu Huang, "Verifiable Visual
Cryptography"• Sixth International Conference on Genetic
and Evolutionary Computing (ICGEC), 2012, 464-467
HAN, Yanyan, Yixiao SHANG, and Wencai HE. "A
Verifiable Color Visual Cryptography Scheme without Pixel
Expansion." Journal of Pattern Recognition & Image
Processing 4.4 (2013): 501-506.
Bin YU, Jin-Yuan LU, Li-Guo FANG.: A Co-cheating
Prevention Visual Cryptography Scheme. Third International
Conference on Information and Computing (ICIC), Vol.4,
157-160 (2010)
Qin Chen, Wen-Fang Pengo Min Zhang, Yi-Ping Chu. : An
(n, n) threshold Visual Cryptography Scheme for Cheating
prevention. Third IEEE International Conference on
Computer Science and Information Technology (ICCSIT),
Vol. 8, 587 -592(2010)
Y.C.Chen,G. Horng, D.S.Tsai, A new authentication based
cheating prevention scheme in Naor-Shamir's visual
cryptography, Journal of Visual Communication and Image
Representation. 23(8) (2012) 1225-1233
Y.C.Chen,G. Horng, D.S.Tsai, Visual secret sharing with
cheating revisited, Digital Signal Processing. 23 (5) (2013)
1449-1504
Lin, P. Y., & Chang, C. C., Cheating resistance and
reversibility-oriented
secret
sharing mechanism. IET
information security, 5(2) (2011).81-92.
Xiaotian Wu, Wei Sun: Random grid-based visual secret
sharing for general access structures with cheat-preventing
ability, The Journal of Systems and Software 85 (2012) 11191134
Chih-Hung Lin et al. : Multi-factor cheating prevention in
visual secret sharing by hybrid codebooks. Vis. Commun.
Image R. 25 (2014) 1543-1557
http://www.ijettjournal.org
Page 101
Download