Skip to main content
Top

2014 | OriginalPaper | Chapter

A Cheat-Prevention Visual Secret Sharing Scheme with Minimum Pixel Expansion

Authors : Shenchuan Liu, Masaaki Fujiyoshi, Hitoshi Kiya

Published in: Digital-Forensics and Watermarking

Publisher: Springer Berlin Heidelberg

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

A visual secret sharing (VSS) scheme with minimum pixel expansion is proposed to prevent malicious participants from deceiving an honest participant. A VSS scheme encrypts a secret image into pieces referred to as shares where each participant keeps a share so that stacking sufficient number of shares recovers the secret image. A cheat prevention VSS scheme provides another piece for each participant for verifying whether the shares presented by other participants are genuine. The proposed scheme improves the contrast of the recovered image and cheat-prevention functionality by introducing randomness in producing pieces for verification. Experimental results show the effectiveness of the proposed scheme.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995) CrossRef Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995) CrossRef
3.
go back to reference Biehl, I., Wetzel, S.: Traceable visual cryptography. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 61–71. Springer, Heidelberg (1997) CrossRef Biehl, I., Wetzel, S.: Traceable visual cryptography. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 61–71. Springer, Heidelberg (1997) CrossRef
4.
go back to reference Hofmeister, T., Krause, M., Simon, H.-U.: Contrast-optimal \(k\) out of \(n\) secret sharing schemes in visual cryptography. Theor. Comput. Sci. 240(2), 471–485 (2000)CrossRefMATHMathSciNet Hofmeister, T., Krause, M., Simon, H.-U.: Contrast-optimal \(k\) out of \(n\) secret sharing schemes in visual cryptography. Theor. Comput. Sci. 240(2), 471–485 (2000)CrossRefMATHMathSciNet
5.
go back to reference Cimato, S., Prisco, R.D., Santis, A.D.: Optimal colored visual cryptography schemes. Des. Codes Crypt. 35, 311–335 (2005)CrossRefMATH Cimato, S., Prisco, R.D., Santis, A.D.: Optimal colored visual cryptography schemes. Des. Codes Crypt. 35, 311–335 (2005)CrossRefMATH
6.
go back to reference Ishihara, T., Koga, H.: A visual secret sharing scheme for color images based on meanvalue-color mixing. IEICE Trans. Fundam. E86–A(1), 194–197 (2003) Ishihara, T., Koga, H.: A visual secret sharing scheme for color images based on meanvalue-color mixing. IEICE Trans. Fundam. E86–A(1), 194–197 (2003)
7.
go back to reference Koga, H., Ishihara, T.: A general method for construction of \((t, n)\)- threshold visual secret sharing schemes for color images. Des. Codes Crypt. 61(2), 223–249 (2011)CrossRefMATHMathSciNet Koga, H., Ishihara, T.: A general method for construction of \((t, n)\)- threshold visual secret sharing schemes for color images. Des. Codes Crypt. 61(2), 223–249 (2011)CrossRefMATHMathSciNet
8.
go back to reference Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Extended capabilities for visual cryptography. Theor. Comput. Sci. 250, 143–161 (2001)CrossRefMATH Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Extended capabilities for visual cryptography. Theor. Comput. Sci. 250, 143–161 (2001)CrossRefMATH
9.
go back to reference Chang, C.-C., Yu, T.-X.: Sharing a secret gray image in multiple secret. In: Proceedings of International Symposium on Cyber Worlds, pp. 1–8 (2002) Chang, C.-C., Yu, T.-X.: Sharing a secret gray image in multiple secret. In: Proceedings of International Symposium on Cyber Worlds, pp. 1–8 (2002)
10.
go back to reference Iwamoto, M., Wang, L., Yoneyama, K., Kunihiro, N., Ohta, K.: Visual secret sharing schemes for multiple secret images allowing the rotation of shares. IEICE Trans. Fundam. E89(5), 1382–1395 (2006)CrossRef Iwamoto, M., Wang, L., Yoneyama, K., Kunihiro, N., Ohta, K.: Visual secret sharing schemes for multiple secret images allowing the rotation of shares. IEICE Trans. Fundam. E89(5), 1382–1395 (2006)CrossRef
11.
go back to reference Iwamoto, M.: A weak security notion for visual secret sharing schemes. IEEE Trans. Inf. Forensics Secur. 7(2), 372–382 (2012)CrossRefMathSciNet Iwamoto, M.: A weak security notion for visual secret sharing schemes. IEEE Trans. Inf. Forensics Secur. 7(2), 372–382 (2012)CrossRefMathSciNet
12.
go back to reference Iwamoto, M.: Security notions of visual secret sharing schemes. In: Proceedings of IWAIT, pp. 95–100 (2013) Iwamoto, M.: Security notions of visual secret sharing schemes. In: Proceedings of IWAIT, pp. 95–100 (2013)
13.
go back to reference Cimato, S., De Santis, A., Ferrara, A.L., Masucci, B.: Ideal contrast visual cryptography schemes with reversing. Inf. Process. Lett. 93(4), 199–206 (2005)CrossRefMATH Cimato, S., De Santis, A., Ferrara, A.L., Masucci, B.: Ideal contrast visual cryptography schemes with reversing. Inf. Process. Lett. 93(4), 199–206 (2005)CrossRefMATH
14.
go back to reference Eisen, P.A., Stinson, D.R.: Threshold visual cryptography with specified whiteness levels of reconstructed pixels. Des. Codes Crypt. 25(1), 15–61 (2002)CrossRefMATHMathSciNet Eisen, P.A., Stinson, D.R.: Threshold visual cryptography with specified whiteness levels of reconstructed pixels. Des. Codes Crypt. 25(1), 15–61 (2002)CrossRefMATHMathSciNet
15.
go back to reference Tsai, D.S., Chen, T.H., Horng, G.: A cheating prevention scheme for binary visual cryptography with homogeneous secret images. Pattern Recog. 40(8), 2356–2366 (2007)CrossRefMATH Tsai, D.S., Chen, T.H., Horng, G.: A cheating prevention scheme for binary visual cryptography with homogeneous secret images. Pattern Recog. 40(8), 2356–2366 (2007)CrossRefMATH
17.
go back to reference Chen, Y.C., Horng, G., Tsai, D.S.: Comment on ‘cheating prevention in visual cryptography’. IEEE Trans. Image Process. 21(7), 3319–3323 (2012)CrossRefMathSciNet Chen, Y.C., Horng, G., Tsai, D.S.: Comment on ‘cheating prevention in visual cryptography’. IEEE Trans. Image Process. 21(7), 3319–3323 (2012)CrossRefMathSciNet
18.
go back to reference Chen, Y.C., Tsai, D.S., Horng, G.: A new authentication based cheating prevention scheme in Naor-Shamir’s visual cryptography. J. Vis. Commun. Image Represent. 23, 1225–1233 (2012)CrossRef Chen, Y.C., Tsai, D.S., Horng, G.: A new authentication based cheating prevention scheme in Naor-Shamir’s visual cryptography. J. Vis. Commun. Image Represent. 23, 1225–1233 (2012)CrossRef
Metadata
Title
A Cheat-Prevention Visual Secret Sharing Scheme with Minimum Pixel Expansion
Authors
Shenchuan Liu
Masaaki Fujiyoshi
Hitoshi Kiya
Copyright Year
2014
Publisher
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-662-43886-2_26

Premium Partner