Developing Visual Cryptography for Authentication on Smartphones

Visual cryptography scheme (VCS) is a kind of cryptography that can be directly decoded by human visual system when transparent films are stacked. It requires no computation for decryption and can be stored in physical materials such as films. Therefore VCS can be a basis for providing secure and dependable authentication scheme, because it cannot be harmed by electronic and/or computational tricks. In this paper, we develop VCS for authentication on smartphones. Several authentication schemes using VCS are designed. Image quality of VCS is an inevitable issue because of small display areas of mobile devices. Thus, we will deal with VCS for continuous-tone images (gray-scale images and color images) that can enhance the image quality of VCS, so that feasible authentication schemes for smartphones will be achieved by using this continuous-tone VCS. Our authentication scheme can avoid the inconvenience of using password everywhere in modern digital life, and also resists attacks from hackers and the man-in-middle attack. This type of authentication using VCS may have a huge impact on future authentication schemes for mobile devices.

[1]  Ja-Chen Lin,et al.  Flip visual cryptography (FVC) with perfect security, conditionally-optimal contrast, and no expansion , 2010, J. Vis. Commun. Image Represent..

[2]  Vaishali B. Bhagat,et al.  AUTHENTICATION FRAMEWORK USING VISUAL CRYPTOGRAPHY , 2013 .

[3]  Moni Naor,et al.  Visual Authentication and Identification , 1997, CRYPTO.

[4]  Michael K. Reiter,et al.  Seeing-is-believing: using camera phones for human-verifiable authentication , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[5]  Ching-Nung Yang,et al.  Embed additional private information into two-dimensional bar codes by the visual secret sharing scheme , 2006, Integr. Comput. Aided Eng..

[6]  P. Babu Anto,et al.  Tamperproof transmission of fingerprints using visual cryptography schemes , 2010, Biometrics Technology.

[7]  Ching-Nung Yang,et al.  Security Analysis of Authentication of Images Using Recursive Visual Cryptography , 2008, Cryptologia.

[8]  WeiQi Yan,et al.  Authenticating Visual Cryptography Shares Using 2D Barcodes , 2011, IWDW.

[9]  Yasushi Yamaguchi,et al.  Enhancing registration tolerance of extended visual cryptography for natural images , 2004, J. Electronic Imaging.

[10]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[11]  Abhinav Aggarwal,et al.  Novel authentication system using visual cryptography , 2011, 2011 World Congress on Information and Communication Technologies.

[12]  WeiQi Yan,et al.  Resolution variant visual cryptography for street view of Google Maps , 2010, Proceedings of 2010 IEEE International Symposium on Circuits and Systems.

[13]  Ching-Nung Yang,et al.  Design a new visual cryptography for human-verifiable authentication in accessing a database , 2015, Journal of Real-Time Image Processing.

[14]  V R Ratheesh,et al.  A VISUAL CRYPTOGRAPHIC SCHEME FOR OWNER AUTHENTICATION USING EMBEDDED SHARES , 2014 .