Skip to main content
Top

2016 | OriginalPaper | Chapter

Developing Visual Cryptography for Authentication on Smartphones

Authors : Ching-Nung Yang, Jung-Kuo Liao, Fu-Heng Wu, Yasushi Yamaguchi

Published in: Industrial IoT Technologies and Applications

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Visual cryptography scheme (VCS) is a kind of cryptography that can be directly decoded by human visual system when transparent films are stacked. It requires no computation for decryption and can be stored in physical materials such as films. Therefore VCS can be a basis for providing secure and dependable authentication scheme, because it cannot be harmed by electronic and/or computational tricks. In this paper, we develop VCS for authentication on smartphones. Several authentication schemes using VCS are designed. Image quality of VCS is an inevitable issue because of small display areas of mobile devices. Thus, we will deal with VCS for continuous-tone images (gray-scale images and color images) that can enhance the image quality of VCS, so that feasible authentication schemes for smartphones will be achieved by using this continuous-tone VCS. Our authentication scheme can avoid the inconvenience of using password everywhere in modern digital life, and also resists attacks from hackers and the man-in-middle attack. This type of authentication using VCS may have a huge impact on future authentication schemes for mobile devices.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995) Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)
2.
go back to reference Surekha, B., Swamy, G., Rao, K.S.: A multiple watermarking technique for images based on visual cryptography. Int. J. Comput. Appl. 1(11), 77–81 (2010) Surekha, B., Swamy, G., Rao, K.S.: A multiple watermarking technique for images based on visual cryptography. Int. J. Comput. Appl. 1(11), 77–81 (2010)
3.
go back to reference Monoth, T., Anto, P.B.: Tamperproof transmission of fingerprints using visual cryptography schemes. Procedia Comput. Sci. 2, 143–148 (2010)CrossRef Monoth, T., Anto, P.B.: Tamperproof transmission of fingerprints using visual cryptography schemes. Procedia Comput. Sci. 2, 143–148 (2010)CrossRef
4.
go back to reference Weir, J., Yan, W.: Resolution variant visual cryptography for street view of google maps. In: Proceedings of ISCAS, pp. 1695–1698 (2010) Weir, J., Yan, W.: Resolution variant visual cryptography for street view of google maps. In: Proceedings of ISCAS, pp. 1695–1698 (2010)
5.
go back to reference Yang, C.N., Chen, T.S., Ching, M.H.: Embed additional private information into two-dimensional barcodes by the visual secret sharing scheme. Integr. Comput. Aided Eng. 13(2), 189–199 (2006) Yang, C.N., Chen, T.S., Ching, M.H.: Embed additional private information into two-dimensional barcodes by the visual secret sharing scheme. Integr. Comput. Aided Eng. 13(2), 189–199 (2006)
6.
go back to reference Naor, M., Pinkas, B.: Visual authentication and identification. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 322–336. Springer, Heidelberg (1997)CrossRef Naor, M., Pinkas, B.: Visual authentication and identification. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 322–336. Springer, Heidelberg (1997)CrossRef
7.
go back to reference McCune, J.M., Perrig, A., Reiter, M.K.: Seeing-is-believing: using camera phones for human-verifiable authentication. In: Proceeidngs of IEEE Symposium on Security Privacy, pp. 110–124 (2005) McCune, J.M., Perrig, A., Reiter, M.K.: Seeing-is-believing: using camera phones for human-verifiable authentication. In: Proceeidngs of IEEE Symposium on Security Privacy, pp. 110–124 (2005)
8.
go back to reference Yang, C.N., Chen, T.S.: Security analysis on authentication of images using recursive visual cryptography. Cryptologia 32(2), 131–136 (2008)CrossRef Yang, C.N., Chen, T.S.: Security analysis on authentication of images using recursive visual cryptography. Cryptologia 32(2), 131–136 (2008)CrossRef
9.
go back to reference Borchert, B., Reinhardt, K.: Applications of visual cryptography. In: Chapter 12 of Visual Cryptography and Secret Image Sharing, Boca Raton, FL. CRC Press/Taylor and Francis (2011) Borchert, B., Reinhardt, K.: Applications of visual cryptography. In: Chapter 12 of Visual Cryptography and Secret Image Sharing, Boca Raton, FL. CRC Press/Taylor and Francis (2011)
10.
go back to reference Jaya, Malik, S., Aggarwal, A., Sardana, A.: Novel authentication system using visual cryptography. In: Information and Communication Technologies (WICT), pp. 1181–1186 (2011) Jaya, Malik, S., Aggarwal, A., Sardana, A.: Novel authentication system using visual cryptography. In: Information and Communication Technologies (WICT), pp. 1181–1186 (2011)
11.
go back to reference Goel, M.B., Bhagat, V.B., Katankar, V.K.: Authentication framework using visual cryptography. Int. J. Res. Eng. Technol. 2, 271–274 (2013) Goel, M.B., Bhagat, V.B., Katankar, V.K.: Authentication framework using visual cryptography. Int. J. Res. Eng. Technol. 2, 271–274 (2013)
12.
go back to reference Ratheesh, V.R., Jogesh, J., Jayamohan, M.: A visual cryptographic scheme for owner authentication using embedded shares. Indian J. Comput. Sci. Eng. 5, 190–194 (2014) Ratheesh, V.R., Jogesh, J., Jayamohan, M.: A visual cryptographic scheme for owner authentication using embedded shares. Indian J. Comput. Sci. Eng. 5, 190–194 (2014)
13.
go back to reference Weir, J., Yan, W.: Authenticating visual cryptography shares using 2D barcodes. In: Shi, Y.Q., Kim, H.-J., Perez-Gonzalez, F. (eds.) IWDW 2011. LNCS, vol. 7128, pp. 196–210. Springer, Heidelberg (2012)CrossRef Weir, J., Yan, W.: Authenticating visual cryptography shares using 2D barcodes. In: Shi, Y.Q., Kim, H.-J., Perez-Gonzalez, F. (eds.) IWDW 2011. LNCS, vol. 7128, pp. 196–210. Springer, Heidelberg (2012)CrossRef
14.
go back to reference Nakajima, M., Yamaguchi, Y.: Enhancing registration tolerance of extended visual cryptography for natural images. J. Electron. Imaging 13, 654–662 (2004)CrossRef Nakajima, M., Yamaguchi, Y.: Enhancing registration tolerance of extended visual cryptography for natural images. J. Electron. Imaging 13, 654–662 (2004)CrossRef
15.
go back to reference Chen, S.K., Lin, S.J., Lin, J.C.: Flip visual cryptography (FVC) with perfect security, conditionally-optimal contrast, and no expansion. J. Vis. Commun. Image Representation 21, 900–916 (2010)CrossRef Chen, S.K., Lin, S.J., Lin, J.C.: Flip visual cryptography (FVC) with perfect security, conditionally-optimal contrast, and no expansion. J. Vis. Commun. Image Representation 21, 900–916 (2010)CrossRef
16.
go back to reference Yang, C.N., Sun, L.Z., Yan, X., Kim, C.: Design a new visual cryptography for human-verifiable authentication in accessing a database. J. Real-Time Image Process. (2015). doi:10.1007/s11554-015-0511-9 Yang, C.N., Sun, L.Z., Yan, X., Kim, C.: Design a new visual cryptography for human-verifiable authentication in accessing a database. J. Real-Time Image Process. (2015). doi:10.​1007/​s11554-015-0511-9
Metadata
Title
Developing Visual Cryptography for Authentication on Smartphones
Authors
Ching-Nung Yang
Jung-Kuo Liao
Fu-Heng Wu
Yasushi Yamaguchi
Copyright Year
2016
DOI
https://doi.org/10.1007/978-3-319-44350-8_19

Premium Partner