A cheating prevention EVC scheme using watermarking techniques
AbstractVisual Cryptography (VC), proposed by Naor and Shamir in 1994, is a variation of the conventional secret sharing scheme. In VC, instead of a numerical secret key, a secret image is shared among participants in the form of images called shares. Each participant possesses his own share which cannot reveal the secret image being alone, making it necessary to stack more than one share of a qualified participant in order to reveal the secret image. Thus in VC the stacking of shares is equivalent to the decryption process, where neither extra computations nor previous knowledge are required to reveal the secret image. Until now some important VC schemes, such as the (k,n)-VC scheme, the general access structure for VC and the extended VC (EVC), have been proposed. Unfortunately all schemes can be cheated, if one or more participants try to generate their fake shares to force the revealed secret image to be a faked one. In this paper, we propose a cheating prevention VC scheme, in which the shares can be identified and authenticated using the EVC scheme and watermarking techniques. In the proposed VC scheme, the share of each participant can be identified by its meaningful appearance instead of noise-like image used in the conventional VC scheme. For the purpose of authentication of each share two binary watermark images are encrypted using shift operation. Before the secret image is revealed, the validation of the shares must be carried out, extracting two watermark images. If they can be extracted correctly, the revealed secret image is considered as authentic; otherwise it is determined as a faked one. The simulation results show the desirable performance of the proposed EVC scheme
M. Naor, A. Shamir. Visual cryptography. Advances in Cryptology-EUROCRYPT’ 94. Ed. Springer-Verlag. 1994. pp. 1-12.
A. Shamir. “How to Share a Secret”. Communications of the ACM. Vol. 22. 1979. pp. 612-613.
G. Ateniese, C. Blundo, A. De Santis, D. Stinson. “Visual Cryptography for General Access Structures”. Int. J. of Computing. Vol. 129. 1996. pp. 86-106.
G. Ateniese, C. Blundo, A. De Santis, D. Stinson. “Extended Scheme for Visual Cryptography”. Theoretical Computer Science. Vol. 11. 1997. pp. 179- 196.
S. Droste. New Results on Visual Cryptography. Lecture Notes in Computer Science, Advances in Cryptology. Ed. Springer-Verlag. Berlin, Germany. 1996. pp. 401-415.
C. Hegde, S. Manus, P. Shenoy, K. Vengopal, L. M. Patnaki. Secure Authentication using Image Processing and Visual Cryptography for Banking Applications. 16th Int. Conf. on Advanced Comp. and Comm. Chennai, India. 2008. pp. 65-72.
Y. Rao, Y. Sukonkina, C. Bhagwati, U. Singh. Fingerprint based authentication application using visual cryptography methods (Improved ID Card). 2008 IEEE Region 10 Conf. Hyderabad, India. 2008. pp. 1-5.
G. Horng, T. Chen, D-S Tsai. “Cheating in Visual Cryptography”. Designs, Codes and Cryptography. Vol. 38. 2006. pp. 219-236.
C-M Hu, W-G Tzeng. “Cheating Prevention in Visual Cryptography”. IEEE Trans. on Image Processing. Vol. 16. 2007. pp. 36-43.
H. Luo, J. Pan, Z. Lu, B. Liao. Watermarking based Transparency Authentication in Visual Cryptography. 3rd Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing. Kaohsiung, Taiwan. 2007. pp. 303-306.
M. Mese, P. Vaidyanathan. “Recent Advances in Digital Halftoning and Inverse Halftoning Methods”. IEEE Trans. on Circuits and Systems-I. Vol. 49. 2002. pp. 790-805.
Copyright (c) 2018 Revista Facultad de Ingeniería
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Authors can archive the pre-print version (i.e., the version prior to peer review) and post-print version (that is, the final version after peer review and layout process) on their personal website, institutional repository and / or thematic repository
- Upon acceptance of an article, it will be published online through the page https://revistas.udea.edu.co/index.php/ingenieria/issue/archive in PDF version with its correspondent DOI identifier
The Revista Facultad de Ingeniería -redin- encourages the Political Constitution of Colombia, chapter IV
Chapter IV Sanctions 51
The following shall be liable to imprisonment for two to five years and a fine of five to 20 times the legal minimum monthly wage: (1) any person who publishes an unpublished literary or artistic work, or part thereof, by any means, without the express prior authorization of the owner of rights; (2) any person who enters in the National Register of Copyright a literary, scientific or artistic work in the name of a person other than the true author, or with its title altered or deleted, or with its text altered, deformed, amended or distorted, or with a false mention of the name of the publisher or phonogram, film, videogram or software producer; (3) any person who in any way or by any means reproduces, disposes of, condenses, mutilates or otherwise transforms a literary, scientific or artistic work without the express prior authorization of the owners thereof; (4) any person who reproduces phonograms, videograms, software or cinematographic works without the express prior authorization of the owner, or transports, stores, stocks, distributes, imports, sells, offers for sale, acquires for sale or distribution or in any way deals in such reproductions. Paragraph. If either the material embodiment or title page of or the introduction to the literary work, phonogram, videogram, software or cinematographic work uses the name, business style, logotype or distinctive mark of the lawful owner of rights, the foregoing sanctions shall be increased by up to half.