A Verifiable Visual Cryptography Scheme

Visual cryptography (VC) is widely used in secret communications without any computations. The past schemes rarely focused on the authentication issue before reconstructing the decrypted image. This paper provided an authentication mechanism for VC and the experiments confirmed its feasibility.

[1]  Gwoboa Horng,et al.  A novel secret image sharing scheme for true-color images with size constraint , 2009, Inf. Sci..

[2]  Paul Feldman,et al.  A practical scheme for non-interactive verifiable secret sharing , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).

[3]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[4]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[5]  Chen Kefei A Cheater Detectable Visual Cryptography Scheme , 2004 .

[6]  Torben P. Pedersen Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.

[7]  Moni Naor,et al.  Visual cryptography for grey level images , 2000, Inf. Process. Lett..

[8]  Baruch Awerbuch,et al.  Verifiable secret sharing and achieving simultaneity in the presence of faults , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).

[9]  Moni Naor,et al.  Visual Authentication and Identification , 1997, CRYPTO.

[10]  Markus Stadler,et al.  Publicly Verifiable Secret Sharing , 1996, EUROCRYPT.

[11]  Chuen-Ching Wang,et al.  Repeating Image Watermarking Technique by the Visual Cryptography , 2000 .

[12]  Jan Camenisch,et al.  An efficient fair payment system , 1996, CCS '96.

[13]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[14]  Mitsugu Iwamoto,et al.  The Optimal n-out-of-n Visual Secret Sharing Scheme for Gray-Scale Images , 2002, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[15]  Gwoboa Horng,et al.  Cheating in Visual Cryptography , 2006, Des. Codes Cryptogr..

[16]  Ching-Nung Yang,et al.  Visual secret sharing scheme: prioritizing the secret pixels with different pixel expansions to enhance the image contrast , 2007 .

[17]  Chin-Chen Chang,et al.  An image intellectual property protection scheme for gray-level images using visual secret sharing strategy , 2002, Pattern Recognit. Lett..