access icon free Cheating prevention visual cryptography scheme using Latin square

In the past decade, the researchers paid more attention to the cheating problem in visual cryptography (VC) so that many cheating prevention visual cryptography schemes (CPVCS) have been proposed. In this paper, the authors propose a novel method, which first makes use of Latin square to prevent cheating in VC. Latin squares are utilised to guide the choosing of authentication regions in different rows and columns of each divided block of the shares, which ensures that the choosing of authentication regions is both random and uniform. Without pixel expansion, the new method provides random regions authentication in each divided block of all shares. What is important is that the proposed method is applicable to both (k, n)-deterministic visual cryptography scheme ((k, n)-DVCS) and (k, n)-probabilistic visual cryptography scheme ((k, n)-PVCS). Experimental results and properties analysis are given to show the effectiveness of the proposed method.

Inspec keywords: cryptography; image processing

Other keywords: (k, n)-PVCS; CPVCS; Latin square; authentication regions; (k, n)-DVCS; cheating prevention visual cryptography schemes; (k-n)-probabilistic visual cryptography scheme; (k-n)-deterministic visual cryptography scheme

Subjects: Data security; Computer vision and image processing techniques; Cryptography; Optical, image and video signal processing

References

    1. 1)
      • 25. Tsai, D.S., Chen, T.H., Horng, G.: ‘A cheating prevention scheme for binary visual cryptography with homogeneous secret images’, Pattern Recogn., 2007, 40, (8), pp. 23562366.
    2. 2)
      • 3. Ateniese, G., Blundo, C., Santis, A.D., et al: ‘Extended capabilities for visual cryptography’, ACM Theor. Comput. Sci., 2001, 250, (1–2), pp. 143161.
    3. 3)
      • 4. Liu, F., Wu, C.K.: ‘Embedded extended visual cryptography schemes’, IEEE Trans. Inf. Forensics Sec., 2011, 6, (2), pp. 307322.
    4. 4)
      • 24. De Prisco, R., De Santis, A.: ‘Cheating immune threshold visual secret sharing’, Comput. J., 2010, 53, (9), pp. 14851496.
    5. 5)
      • 18. Ren, Y.W., Liu, F., Lin, D.D., et al: ‘A new construction of tagged visual cryptography scheme’. IWDW 2015 (LNCS, 9569), pp. 433445.
    6. 6)
      • 14. De Prisco, R., De Santis, A.: ‘On the relation of random grid and deterministic visual cryptography’, IEEE Trans. Inf. Forensics Sec., 2014, 9, (4), pp. 653665.
    7. 7)
      • 2. Ateniese, G., Blundo, C., Santis, A.D., et al: ‘Visual cryptography for general access structures’, Inf. Comput., 1996, 129, pp. 86106.
    8. 8)
      • 7. Cimato, S., De Prisco, R., De Santis, A.: ‘Probabilistic visual cryptography schemes’, Comput. J., 2006, 49, pp. 97107.
    9. 9)
      • 8. Hou, Y.C., Tu, S.F.: ‘A visual cryptographic technique for chromatic images using multipixel encoding method’, J. Res. Pract. Inf. Technol., 2005, 37, pp. 179191.
    10. 10)
      • 27. Hu, C.M., Tzeng, W.G.: ‘Cheating prevention in visual cryptography’, IEEE Trans. Image Process., 2007, 16, (1), pp. 3645.
    11. 11)
      • 26. Horng, G., Chen, T.H., Tsai, D.S.: ‘Cheating in visual cryptography’, Des. Codes Cryptogr., 2006, 38, pp. 219236.
    12. 12)
      • 10. Shyu, S.: ‘Image encryption by random grids’, Pattern Recogn., 2007, 40, pp. 10141031.
    13. 13)
      • 5. Ito, R., Kuwakado, H., Tanaka, H.: ‘Image size invariant visual cryptography’, IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 1999, E82-A, (10), pp. 21722177.
    14. 14)
      • 23. De Prisco, R., De Santis, A.: ‘Cheating immune (2, n)-threshold visual secret sharing’. SCN 2006 (LNCS, 4116), pp. 216228.
    15. 15)
      • 6. Yang, C.N.: ‘New visual secret sharing schemes using probabilistic method’, Pattern Recogn. Lett., 2004, 25, pp. 481494.
    16. 16)
      • 11. Chen, T., Tsao, K.: ‘Threshold visual secret sharing by random grids’, J. Syst. Softw., 2011, 84, pp. 11971208.
    17. 17)
      • 15. Yang, C.N., Wu, C.C., Wang, D.S.: ‘A discussion on the relationship between probabilistic visual cryptography and random grid’, Inf. Sci., 2014, 278, pp. 141173.
    18. 18)
      • 16. Wang, R.Z., Hsu, S.F.: ‘Tagged visual cryptography’, IEEE Signal Process. Lett., 2011, 18, (11), pp. 627630.
    19. 19)
      • 1. Naor, M., Shamir, A.: ‘Visual cryptography’. EUROCRYPT'94, 1995, (LNCS, 950), pp. 112.
    20. 20)
      • 19. Hou, Y.C., Quan, Z.Y.: ‘Progressive visual cryptography with unexpanded shares’, IEEE Trans. Circuits Syst. Video Technol., 2011, 21, (11), pp. 17601764.
    21. 21)
      • 9. Liu, F., Guo, T., Wu, C.K., et al: ‘Improving the visual quality of size invariant visual cryptography scheme’, J. Vis. Commun. Image Represent., 2012, 23, pp. 331342.
    22. 22)
      • 13. Wu, X., Sun, W.: ‘Generalized random grid and its applications in visual cryptography’, IEEE Trans. Inf. Forensics Sec., 2013, 8, (9), pp. 15411553.
    23. 23)
      • 29. Chen, Y.C., Horng, G., Tsai, D.S.: ‘Comment on ‘Cheating prevention in visual cryptography’’, IEEE Trans. Image Process., 2012, 21, (7), pp. 33193323.
    24. 24)
      • 17. Ou, D.H., Wu, X.T., Dai, L., et al: ‘Improved tagged visual cryptograms by using random grids’. IWDW 2013 (LNCS, 8389), pp. 7994.
    25. 25)
      • 20. Yan, X.H., Wang, S., Niu, X.M.: ‘Threshold construction from specific cases in visual cryptography without the pixel expansion’, Signal Process., 2014, 105, pp. 389398.
    26. 26)
      • 12. Guo, T., Liu, F., Wu, C.K.: ‘Threshold visual secret sharing by random grids with improved contrast’, J. Syst. Softw., 2013, 86, (8), pp. 20942109.
    27. 27)
      • 30. Chen, Y.C., Tsai, D.S., Horng, G.: ‘A new authentication based cheating prevention scheme in Naor – Shamir's visual cryptography’, J. Vis. Commun. Image Represent., 2012, 23, pp. 12251233.
    28. 28)
      • 22. Yang, C.N., Laih, C.S.: ‘Some new types of visual secret sharing schemes’. Proc. of National Computer Symp., 1999, vol. 3, pp. 260268.
    29. 29)
      • 21. Liu, F., Yan, W.Q.: ‘Visual cryptography for image processing and security-Theory Methods and Applications’ (Springer-Verlag, 2014).
    30. 30)
      • 28. Liu, F., Wu, C.K., Lin, X.J.: ‘Cheating immune visual cryptography scheme’, IET Inf. Sec., 2011, 5, pp. 5159.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2016.0126
Loading

Related content

content/journals/10.1049/iet-ifs.2016.0126
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading