A cheating prevention scheme for binary visual cryptography with homogeneous secret images

In 1995, Naor and Shamir proposed the k-out-of-n visual cryptography scheme such that only more than or equal to k participants can visually recover the secret through superimposing their transparencies. Visual cryptography schemes have been extensively investigated since their invention and extended to numerous applications such as visual authentication and identification, steganography, and image encryption. In 2006, Horng et al. proposed that cheating is possible where some participants can deceive the remaining participants by delivering forged transparencies. Meanwhile, Horng et al. also proposed two cheating prevention schemes. One scheme, however, requires extra verification transparencies and the other needs larger transparencies. In other words, compared to visual cryptography, both schemes burden each participant with an additional problem of transparency management. In this paper, a more secure scheme is given to solve the cheating problem without extra burdens by adopting multiple distinct secret images. Moreover, for sharing these secret images simultaneously, the share construction method of visual cryptography is redesigned and extended by generic algorithms. Finally, the results of the experiment and security analysis show that not only the proposed scheme is more secure in comparison with the two previous cheating prevention schemes in the literature, but extra burdens are also eliminated.

[1]  Alfredo De Santis,et al.  Contrast Optimal Threshold Visual Cryptography Schemes , 2003, SIAM J. Discret. Math..

[2]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[3]  Rastislav Lukac,et al.  Bit-level based secret sharing for image encryption , 2005, Pattern Recognition.

[4]  Chuen-Ching Wang,et al.  Repeating Image Watermarking Technique by the Visual Cryptography , 2000 .

[5]  Chin-Chen Chang,et al.  An image intellectual property protection scheme for gray-level images using visual secret sharing strategy , 2002, Pattern Recognit. Lett..

[6]  Young-Chang Hou,et al.  Visual cryptography for color images , 2003, Pattern Recognit..

[7]  Moni Naor,et al.  Visual cryptography for grey level images , 2000, Inf. Process. Lett..

[8]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[9]  Alfredo De Santis,et al.  Visual Cryptography for General Access Structures , 1996, Inf. Comput..

[10]  Moni Naor,et al.  Visual Authentication and Identification , 1997, CRYPTO.

[11]  Chang-Chou Lin,et al.  Visual cryptography for gray-level images by dithering techniques , 2003, Pattern Recognit. Lett..

[12]  Gwoboa Horng,et al.  Cheating in Visual Cryptography , 2006, Des. Codes Cryptogr..

[13]  MARCO CARPENTIERI A perfect threshold secret sharing scheme to identify cheaters , 1995, Des. Codes Cryptogr..

[14]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[15]  Moni Naor,et al.  Visual Cryptography II: Improving the Contrast Via the Cover Base , 1996, Security Protocols Workshop.