Skip to main content

2016 | OriginalPaper | Buchkapitel

Developing Visual Cryptography for Authentication on Smartphones

verfasst von : Ching-Nung Yang, Jung-Kuo Liao, Fu-Heng Wu, Yasushi Yamaguchi

Erschienen in: Industrial IoT Technologies and Applications

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Visual cryptography scheme (VCS) is a kind of cryptography that can be directly decoded by human visual system when transparent films are stacked. It requires no computation for decryption and can be stored in physical materials such as films. Therefore VCS can be a basis for providing secure and dependable authentication scheme, because it cannot be harmed by electronic and/or computational tricks. In this paper, we develop VCS for authentication on smartphones. Several authentication schemes using VCS are designed. Image quality of VCS is an inevitable issue because of small display areas of mobile devices. Thus, we will deal with VCS for continuous-tone images (gray-scale images and color images) that can enhance the image quality of VCS, so that feasible authentication schemes for smartphones will be achieved by using this continuous-tone VCS. Our authentication scheme can avoid the inconvenience of using password everywhere in modern digital life, and also resists attacks from hackers and the man-in-middle attack. This type of authentication using VCS may have a huge impact on future authentication schemes for mobile devices.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995) Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)
2.
Zurück zum Zitat Surekha, B., Swamy, G., Rao, K.S.: A multiple watermarking technique for images based on visual cryptography. Int. J. Comput. Appl. 1(11), 77–81 (2010) Surekha, B., Swamy, G., Rao, K.S.: A multiple watermarking technique for images based on visual cryptography. Int. J. Comput. Appl. 1(11), 77–81 (2010)
3.
Zurück zum Zitat Monoth, T., Anto, P.B.: Tamperproof transmission of fingerprints using visual cryptography schemes. Procedia Comput. Sci. 2, 143–148 (2010)CrossRef Monoth, T., Anto, P.B.: Tamperproof transmission of fingerprints using visual cryptography schemes. Procedia Comput. Sci. 2, 143–148 (2010)CrossRef
4.
Zurück zum Zitat Weir, J., Yan, W.: Resolution variant visual cryptography for street view of google maps. In: Proceedings of ISCAS, pp. 1695–1698 (2010) Weir, J., Yan, W.: Resolution variant visual cryptography for street view of google maps. In: Proceedings of ISCAS, pp. 1695–1698 (2010)
5.
Zurück zum Zitat Yang, C.N., Chen, T.S., Ching, M.H.: Embed additional private information into two-dimensional barcodes by the visual secret sharing scheme. Integr. Comput. Aided Eng. 13(2), 189–199 (2006) Yang, C.N., Chen, T.S., Ching, M.H.: Embed additional private information into two-dimensional barcodes by the visual secret sharing scheme. Integr. Comput. Aided Eng. 13(2), 189–199 (2006)
6.
Zurück zum Zitat Naor, M., Pinkas, B.: Visual authentication and identification. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 322–336. Springer, Heidelberg (1997)CrossRef Naor, M., Pinkas, B.: Visual authentication and identification. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 322–336. Springer, Heidelberg (1997)CrossRef
7.
Zurück zum Zitat McCune, J.M., Perrig, A., Reiter, M.K.: Seeing-is-believing: using camera phones for human-verifiable authentication. In: Proceeidngs of IEEE Symposium on Security Privacy, pp. 110–124 (2005) McCune, J.M., Perrig, A., Reiter, M.K.: Seeing-is-believing: using camera phones for human-verifiable authentication. In: Proceeidngs of IEEE Symposium on Security Privacy, pp. 110–124 (2005)
8.
Zurück zum Zitat Yang, C.N., Chen, T.S.: Security analysis on authentication of images using recursive visual cryptography. Cryptologia 32(2), 131–136 (2008)CrossRef Yang, C.N., Chen, T.S.: Security analysis on authentication of images using recursive visual cryptography. Cryptologia 32(2), 131–136 (2008)CrossRef
9.
Zurück zum Zitat Borchert, B., Reinhardt, K.: Applications of visual cryptography. In: Chapter 12 of Visual Cryptography and Secret Image Sharing, Boca Raton, FL. CRC Press/Taylor and Francis (2011) Borchert, B., Reinhardt, K.: Applications of visual cryptography. In: Chapter 12 of Visual Cryptography and Secret Image Sharing, Boca Raton, FL. CRC Press/Taylor and Francis (2011)
10.
Zurück zum Zitat Jaya, Malik, S., Aggarwal, A., Sardana, A.: Novel authentication system using visual cryptography. In: Information and Communication Technologies (WICT), pp. 1181–1186 (2011) Jaya, Malik, S., Aggarwal, A., Sardana, A.: Novel authentication system using visual cryptography. In: Information and Communication Technologies (WICT), pp. 1181–1186 (2011)
11.
Zurück zum Zitat Goel, M.B., Bhagat, V.B., Katankar, V.K.: Authentication framework using visual cryptography. Int. J. Res. Eng. Technol. 2, 271–274 (2013) Goel, M.B., Bhagat, V.B., Katankar, V.K.: Authentication framework using visual cryptography. Int. J. Res. Eng. Technol. 2, 271–274 (2013)
12.
Zurück zum Zitat Ratheesh, V.R., Jogesh, J., Jayamohan, M.: A visual cryptographic scheme for owner authentication using embedded shares. Indian J. Comput. Sci. Eng. 5, 190–194 (2014) Ratheesh, V.R., Jogesh, J., Jayamohan, M.: A visual cryptographic scheme for owner authentication using embedded shares. Indian J. Comput. Sci. Eng. 5, 190–194 (2014)
13.
Zurück zum Zitat Weir, J., Yan, W.: Authenticating visual cryptography shares using 2D barcodes. In: Shi, Y.Q., Kim, H.-J., Perez-Gonzalez, F. (eds.) IWDW 2011. LNCS, vol. 7128, pp. 196–210. Springer, Heidelberg (2012)CrossRef Weir, J., Yan, W.: Authenticating visual cryptography shares using 2D barcodes. In: Shi, Y.Q., Kim, H.-J., Perez-Gonzalez, F. (eds.) IWDW 2011. LNCS, vol. 7128, pp. 196–210. Springer, Heidelberg (2012)CrossRef
14.
Zurück zum Zitat Nakajima, M., Yamaguchi, Y.: Enhancing registration tolerance of extended visual cryptography for natural images. J. Electron. Imaging 13, 654–662 (2004)CrossRef Nakajima, M., Yamaguchi, Y.: Enhancing registration tolerance of extended visual cryptography for natural images. J. Electron. Imaging 13, 654–662 (2004)CrossRef
15.
Zurück zum Zitat Chen, S.K., Lin, S.J., Lin, J.C.: Flip visual cryptography (FVC) with perfect security, conditionally-optimal contrast, and no expansion. J. Vis. Commun. Image Representation 21, 900–916 (2010)CrossRef Chen, S.K., Lin, S.J., Lin, J.C.: Flip visual cryptography (FVC) with perfect security, conditionally-optimal contrast, and no expansion. J. Vis. Commun. Image Representation 21, 900–916 (2010)CrossRef
16.
Zurück zum Zitat Yang, C.N., Sun, L.Z., Yan, X., Kim, C.: Design a new visual cryptography for human-verifiable authentication in accessing a database. J. Real-Time Image Process. (2015). doi:10.1007/s11554-015-0511-9 Yang, C.N., Sun, L.Z., Yan, X., Kim, C.: Design a new visual cryptography for human-verifiable authentication in accessing a database. J. Real-Time Image Process. (2015). doi:10.​1007/​s11554-015-0511-9
Metadaten
Titel
Developing Visual Cryptography for Authentication on Smartphones
verfasst von
Ching-Nung Yang
Jung-Kuo Liao
Fu-Heng Wu
Yasushi Yamaguchi
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-44350-8_19

Premium Partner