YCC-HT

advertisement
Cheating prevention in visual
cryptography
Author: C.M. Hu and W.G. Tzeng
Source: IEEE-TIP 2007
Presenter: Yu-Chi Chen
Date: 2010.9.21
2015/4/8
1
Outline
•
•
•
•
Introduction
Cheating in VC
Review HT scheme
Conclusions
2015/4/8
2
Visual Cryptography
• a variant of secret sharing (Noar and Shamir)
2015/4/8
3
Introduction - (2,2)-VSS
1 0
0
T 

1
0


1 0 
1
T 

0
1


1
0
0
1
1
0
0
1
1 0 0 1
1 0 0 1



Permutation from T0
1
0
0
1
1
0
0
1
0
1
1
0
1 0 0 1
0 1 1 0



Permutation from T1
1
2015/4/8
4
1
1
1
Introduction - (2,3)-VSS
1 0 0
T 0  1 0 0
1 0 0
1 0 0
T 1  0 1 0
0 0 1
2015/4/8
5
1 0 0 0 1 0
1 0 0 0 1 0



1 0 0 0 1 0
T1
1
0
0
0
1
0
T1+T2 1
0
0
0
1
0
T2
1
0
0
0
1
0
T2+T3 1
0
0
0
1
0
T3
1
0
0
0
1
0
T1+T3 1
0
0
0
1
0
1 0 0   0 1 0 
 0 1 0  1 0 0 



0 0 1 0 0 1
T1
1
0
0
0
1
0
T1+T2 1
1
0
1
1
0
T2
0
1
0
1
0
0
T2+T3 0
1
1
1
0
1
T3
0
0
1
0
0
1
T1+T3 1
0
1
0
1
1
2015/4/8
6
Outline
•
•
•
•
Introduction
Cheating in VC
Review HT scheme
Conclusions
2015/4/8
7
Cheating in VC
1 0 0  0 1 0 
0 1 0  1 0 0 



       
T1
1
0
0
0
1
0
T2
0
1
0
1
0
0
Black
1 0 0   0 1 0 
 0 1 0  1 0 0 



0 0 1 0 0 1
T3
0
2015/4/8
0
1
0
0
1
8
Cheating in VC
P1
collude
1 0 0  0 1 0 
0 1 0  1 0 0 



       
T1
1
0
0
0
1
0
T2
0
1
0
1
0
0
1 0 0   0 1 0 
 0 1 0  1 0 0 



0 0 1 0 0 1
T3
0
2015/4/8
0
1
0
0
P2
T2’ 0
0
1
0
0
1
0
0
1
0
0
1
Succeed to cheat T3.
Replace Black into White
1
9
Cheating in VC
• Cheating prevention scheme (also called
“cheating immune scheme”)
– Authentication based
• Horng et al.’s scheme 1 DCC06
• Hu and Tzeng’s scheme IEEE TIP07
– Guessing probability based (provably secure)
• Horng et al.’s scheme 2 DCC06
• Tsai et al.’s scheme PR07
• De Prisco and De Santis’s scheme CJ09
2015/4/8
10
Outline
•
•
•
•
Introduction
Cheating in VC
Review HT scheme
Conclusions
2015/4/8
11
Review of HT scheme
• Proposed by Hu and Tzeng, and published in
IEEE Transactions on Image Processing 2007.
• It is an authentication based cheating
prevention (ABCP) scheme.
2015/4/8
12
Review of HT scheme
• Participants decide verification images
respectively.
• The dealer will share the secret image and the
verification images (VI).
• Finally, a participant gets a share from the
other one, and then recover the secret.
2015/4/8
13
Review of HT scheme
• Shares generating (basic matrices in HT):
10 1 0 0


• BW= 10 1 0 0
10 1 0 0
Extra subpixels (verifying).
1 0 1 0 0


• BB= 10 0 1 0
1 0 0 0 1
2015/4/8
14
Review of HT scheme
• Verification shares generating:
• If the pixel in VI is black, the sibpixels are
[0 1 0 0 0]. (which corresponds to the
permutation of basic matrices)
• If the pixel in VI is white, the sibpixels are
[1 0 0 0 0].
Extra subpixels.
2015/4/8
15
Review of HT scheme
Example:
T1, T2, T3
T1+T2, T1+T3, T2+T3
V1, V2, V3
V1+T2, V1+T3, V2+T1
V2+T3, V3+T1, V3+T2
2015/4/8
16
T1[1 0 1 0 0] (white)
T2[1 0 0 1 0] (white)
T1+T2[1 0 1 1 0] (black)
V2[0 1 0 0 0] (white +)
T1+V2[1 1 1 0 0] (black)
Review of Horng et al.’s scheme
Verification logo LC
Stacking VC and SA, LC is
shown on the left-top corner
Stacking VC and SB, LC is
shown on the right-top corner
2015/4/8
17
Conclusions
• HT scheme is a cheating immune VSS scheme.
• In this paper, three kinds of cheating are
proposed by Hu and Tzeng.
• They also analyze Horng et al.’s ABCP scheme
is not cheating immune.
2015/4/8
18
Download