Title :
Comment on “Cheating Prevention in Visual Cryptography”
Author :
Yu-Chi Chen ; Horng, Gwoboa ; Du-Shiau Tsai
Author_Institution :
Dept. of Comput. Sci. & Eng., Nat. Chung Hsing Univ., Taichung, Taiwan
fDate :
7/1/2012 12:00:00 AM
Abstract :
Visual cryptography (VC), proposed by Naor and Shamir, has numerous applications, including visual authentication and identification, steganography, and image encryption. In 2006, Horng showed that cheating is possible in VC, where some participants can deceive the remaining participants by forged transparencies. Since then, designing cheating-prevention visual secret-sharing (CPVSS) schemes has been studied by many researchers. In this paper, we cryptanalyze the Hu-Tzeng CPVSS scheme and show that it is not cheating immune. We also outline an improvement that helps to overcome the problem.
Keywords :
cryptography; image coding; steganography; CPVSS schemes; cheating-prevention visual secret-sharing scheme; image encryption; steganography; visual cryptography; Authentication; Cryptography; Image reconstruction; Pattern recognition; Stacking; Visualization; Cheating-prevention scheme; cheating; secret sharing; visual cryptography (VC); Algorithms; Computer Graphics; Computer Security; Humans; Image Enhancement; Image Interpretation, Computer-Assisted; Information Storage and Retrieval; Pattern Recognition, Visual;
Journal_Title :
Image Processing, IEEE Transactions on
DOI :
10.1109/TIP.2012.2190082