Title : 
Tagged visual cryptography with access control
         
        
            Author : 
Yi-Hui Chen ; Chi-Shiang Chan ; Po-Yu Hsu ; Wei-Lin Huang
         
        
            Author_Institution : 
Dept. of Appl. Inf. & Multimedia, Asia Univ., Taichung, Taiwan
         
        
        
        
        
        
            Abstract : 
Visual cryptography is a way to encrypt the secret image into several meaningless share images. Noted that no information can be obtained if not all of the shares are collected. Stacking the share images, the secret image can be retrieved. The share images are meaningless to owner which results in difficult to manage. Tagged visual cryptography is a skill to print a pattern onto meaningless share images. After that, users can easily manage their own share images according to the printed pattern. Besides, access control is another popular topic to allow a user or a group to see the own authorizations. In this paper, a self-authentication mechanism with lossless construction ability for image secret sharing scheme is proposed. The experiments provide the positive data to show the feasibility of the proposed scheme.
         
        
            Keywords : 
authorisation; cryptography; image coding; message authentication; access control; authorization; image secret sharing scheme; lossless construction ability; meaningless share images; printed pattern; secret image; self-authentication mechanism; tagged visual cryptography; Authentication; Encryption; Equations; Pattern recognition; Stacking; Visualization; Visual cryptography; access control; secret sharing; tagged visual cryptography;
         
        
        
        
            Conference_Titel : 
Multimedia and Expo Workshops (ICMEW), 2014 IEEE International Conference on
         
        
            Conference_Location : 
Chengdu
         
        
        
        
            DOI : 
10.1109/ICMEW.2014.6890648