Basic Visual Cryptography Using Braille

As a significant part of information security, Visual Cryptography VC is a secret sharing approach which has the advantage of effectively obscuring hints of original secret. In VC, a secret image is separated into partitions which are also known as VC shares. The secret is only able to be revealed by superimposing certain shares. Since Basic VC is in a structure which is similar to that of Braille where white and black dots are arranged in certain orders, it is feasible to utilize the feature of Braille for the authentication of VC. In this paper, the authors will conduct an experiment embedding Braille into grayscale and halftone images as well as VC shares. The result indicates that the embedding of Braille has little impact on VC secret revealing and enhances the security of VC shares.

[1]  WeiQi Yan,et al.  Sharing multiple secrets using visual cryptography , 2009, 2009 IEEE International Symposium on Circuits and Systems.

[2]  Gwoboa Horng,et al.  Cheating in Visual Cryptography , 2006, Des. Codes Cryptogr..

[3]  N O'Connor,et al.  Functional asymmetry in the reading of Braille. , 1971, Neuropsychologia.

[4]  Ran-Zan Wang,et al.  Sharing multiple secrets in visual cryptography , 2007, Pattern Recognit..

[5]  M. Hallett,et al.  Activation of the primary visual cortex by Braille reading in blind subjects , 1996, Nature.

[6]  M. Hallett,et al.  Neural networks for Braille reading by the blind. , 1998 .

[7]  WeiQi Yan,et al.  A Comprehensive Study of Visual Cryptography , 2010, Trans. Data Hiding Multim. Secur..

[8]  Liz Stillwaggon Swan,et al.  A Biosemiotic Analysis of Braille , 2010, Biosemiotics.

[9]  Gwoboa Horng,et al.  A new authentication based cheating prevention scheme in Naor-Shamir's visual cryptography , 2012, J. Vis. Commun. Image Represent..

[10]  Wei Qi Yan,et al.  Dot-Size Variant Visual Cryptography , 2009, IWDW.

[11]  K.R. Venugopal,et al.  Secure Authentication using Image Processing and Visual Cryptography for Banking Applications , 2008, 2008 16th International Conference on Advanced Computing and Communications.

[12]  WeiQi Yan,et al.  Authenticating Visual Cryptography Shares Using 2D Barcodes , 2011, IWDW.

[13]  Jie Li,et al.  The Research on Paper-Mediated Braille Automatic Recognition Method , 2010, 2010 Fifth International Conference on Frontier of Computer Science and Technology.

[14]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[15]  Paul Janecek,et al.  Using advanced encryption standard to secure the content dissemination of electronic Braille books , 2009 .

[16]  Nasir D. Memon,et al.  Protecting digital media content , 1998, CACM.

[17]  Feng Liu,et al.  Cheating immune visual cryptography scheme , 2011, IET Inf. Secur..

[18]  Á. Pascual-Leone,et al.  Tactile spatial resolution in blind Braille readers , 2000, Neurology.

[19]  Moni Naor,et al.  Visual Authentication and Identification , 1997, CRYPTO.

[20]  Tzung-Her Chen,et al.  Insight into collusion attacks in random-grid-based visual secret sharing , 2012, Signal Process..

[21]  Henk D. L. Hollmann,et al.  XOR-based Visual Cryptography Schemes , 2005, Des. Codes Cryptogr..

[22]  Feng Liu,et al.  Braille for Visual Cryptography , 2014, 2014 IEEE International Symposium on Multimedia.

[23]  Matthias M. Müller,et al.  Changed perceptions in Braille readers , 1998, Nature.

[24]  C. Y. Nolan,et al.  Perceptual Factors in Braille Word Recognition. (American Foundation for the Blind. Research Series No. 20). , 1969 .

[25]  Wen-Guey Tzeng,et al.  Cheating Prevention in Visual Cryptography , 2007, IEEE Transactions on Image Processing.

[26]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[27]  Mohan S. Kankanhalli,et al.  Visual cryptography for print and scan applications , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).

[28]  Hee Il Hahn,et al.  Improving Performance of the Decoder for Two-Dimensional Barcode Symbology PDF417 , 2004, ICINCO.