Authenticating Visual Cryptography Shares Using 2D Barcodes

One of the problems pertinent with many visual cryptography (VC) schemes is that of authentication. VC provides a way of sharing secrets between a number of participants. The secrets are in the form of an image that is encoded into multiple pieces known as shares. When these shares are physically superimposed, the secret can be instantly observed. A known problem is that of authentication. How is it possible to know that the secret being recovered is genuine? There has been some work devoted to this using so called cheating prevention schemes which attempt to provide a means of traceability or authentication via a set of additional shares that are used to check authenticity. This paper proposes a scheme that attempts to alleviate this suspicion by using 2D barcodes as a means of authentication which may have more practicality in terms of real world usage. Results are provided using an application that is available on mobile devices for portable barcode reading.

[1]  Susanne Wetzel,et al.  Traceable visual cryptography , 1997, ICICS.

[2]  Wei Qi Yan,et al.  Image Hatching for Visual Cryptography , 2009, IMVIP.

[3]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[4]  Alfredo De Santis,et al.  Advances in Cryptology — EUROCRYPT'94 , 1994, Lecture Notes in Computer Science.

[5]  Marten van Dijk,et al.  Visual Crypto Displays Enabling Secure Communications , 2003, SPC.

[6]  WeiQi Yan,et al.  Resolution variant visual cryptography for street view of Google Maps , 2010, Proceedings of 2010 IEEE International Symposium on Circuits and Systems.

[7]  Wen-Guey Tzeng,et al.  Cheating Prevention in Visual Cryptography , 2007, IEEE Transactions on Image Processing.

[8]  J. Rouillard,et al.  Contextual QR Codes , 2008, 2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008).

[9]  Gwoboa Horng,et al.  A cheating prevention scheme for binary visual cryptography with homogeneous secret images , 2007, Pattern Recognit..

[10]  Gwoboa Horng,et al.  Cheating in Visual Cryptography , 2006, Des. Codes Cryptogr..

[11]  Wei Qi Yan,et al.  Dot-Size Variant Visual Cryptography , 2009, IWDW.

[12]  Chin-Chen Chang,et al.  Preventing Cheating in Computational Visual Cryptography , 2009, Fundam. Informaticae.

[13]  K.R. Venugopal,et al.  Secure Authentication using Image Processing and Visual Cryptography for Banking Applications , 2008, 2008 16th International Conference on Advanced Computing and Communications.

[14]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[15]  Burton S. Kaliski Advances in Cryptology - CRYPTO '97 , 1997 .

[16]  Frank Stajano Security in Pervasive Computing , 2003, SPC.

[17]  Tzung-Her Chen,et al.  (Designs, Codes and Cryptography,38(2):219-236)Cheating in Visual Cryptography , 2006 .

[18]  Moni Naor,et al.  Visual Authentication and Identification , 1997, CRYPTO.

[19]  Mohan S. Kankanhalli,et al.  Image Hatching for Visual Cryptography , 2009, 2009 13th International Machine Vision and Image Processing Conference.

[20]  Alfredo De Santis,et al.  Cheating Immune Threshold Visual Secret Sharing , 2010, Comput. J..

[21]  Chih-Hao Lin,et al.  A New Credit Card Payment Scheme Using Mobile Phones Based on Visual Cryptography , 2008, ISI Workshops.

[22]  Jianying Zhou,et al.  Information and Communications Security , 2013, Lecture Notes in Computer Science.

[23]  Henk D. L. Hollmann,et al.  XOR-based Visual Cryptography Schemes , 2005, Des. Codes Cryptogr..