Skip to main content

A Study for Security of Visual Cryptography

  • Conference paper
  • First Online:
Codes, Cryptology and Information Security (C2SI 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13874))

  • 280 Accesses

Abstract

We verify the achievement of information-theoretic security of Visual Cryptography (VC) based on the detailed attack scenario. In addition, practical VCs use pseudo-random permutation (PRP) as a random shuffle, which we also verify in this case. As a result, practical VCs only have computational security and require true random number generators (TRNGs) to achieve information-theoretic security. We derive a rational evaluation standard for VC’s security from the detailed attack scenario. Based on it, we consider an attack method using multiple shared images that is more effective than the brute-force search. In this study, we execute computer simulations of XOR differential attack on two shared images and observe the bias on the appearance frequency of the differential output. From these above results, we can conclude that it is necessary to generate the basis matrices with the same Hamming weight for all rows to guarantee the security of VCs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mathematica. https://www.wolfram.com/mathematica/

  2. Aravind, K., Krishnan, M.R.M.V.: Anti-phishing framework for banking based on visual cryptography. Int. J. Comput. Sci. Mob. Appl. 2(1), 121–126 (2014)

    Google Scholar 

  3. Blundo, C., D’Arco, P., Santis, A.D., Stinson, D.R.: Contrast optimal threshold visual cryptography schemes. SIAM J. Discret. Math. 16(2), 224–261 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  4. D’Arco, P., Prisco, R.D., Santis, A.D.: Measure-independent characterization of contrast optimal visual cryptography schemes. J. Syst. Softw. 95, 89–99 (2014)

    Article  MATH  Google Scholar 

  5. Dutta, S., Adhikari, A., Ruj, S.: Maximal contrast color visual secret sharing schemes. Des. Codes Cryptogr. 87(7), 1699–1711 (2019)

    Article  MathSciNet  MATH  Google Scholar 

  6. Hofmeister, T., Krause, M., Simon, H.U.: Contrast-optimal k out of n secret sharing schemes in visual cryptography. Theor. Comput. Sci. 240(2), 471–485 (2000)

    Article  MathSciNet  MATH  Google Scholar 

  7. Horng, G., Chen, T., Tsai, D.: Cheating in visual cryptography. Des. Codes Cryptogr. 38(2), 219–236 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  8. Hou, Y., Quan, Z.: Progressive visual cryptography with unexpanded shares. IEEE Trans. Circuits Syst. Video Technol. 21(11), 1760–1764 (2011)

    Article  Google Scholar 

  9. Iwamoto, M.: A weak security notion for visual secret sharing schemes. IEEE Trans. Inf. Forensics Secur. 7(2), 372–382 (2012)

    Article  Google Scholar 

  10. Iwamoto, M., Yamamoto, H., Ogawa, H.: Optimal multiple assignments based on integer programming in secret sharing schemes with general access structures. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(1), 101–112 (2007)

    Google Scholar 

  11. James, D., Philip, M.: A novel anti phishing framework based on visual cryptography. In: 2012 International Conference on Power, Signals, Controls and Computation, pp. 1–5. IEEE (2012)

    Google Scholar 

  12. Jin, D., Yan, W., Kankanhalli, M.S.: Progressive color visual cryptography. J. Electron. Imaging 14(3), 033019 (2005)

    Article  Google Scholar 

  13. Leung, B.W., Ng, F.Y., Wong, D.S.: On the security of a visual cryptography scheme for color images. Pattern Recogn. 42(5), 929–940 (2009)

    Article  MATH  Google Scholar 

  14. Liu, F., Wu, C.K., Lin, X.J.: Cheating immune visual cryptography scheme. IET Inf. Secur. 5(1), 51–59 (2011)

    Article  Google Scholar 

  15. Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995). https://doi.org/10.1007/BFb0053419

    Chapter  Google Scholar 

  16. Okada, K., Koga, H.: A construction of the progressive (3, n)-threshold visual cryptography using a BIBD and analysis of its optimality. In: 2017 IEEE Information Theory Workshop, ITW 2017, Kaohsiung, Taiwan, 6–10 November 2017, pp. 249–253. IEEE (2017)

    Google Scholar 

  17. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  18. Shyu, S.J., Chen, M.C.: Optimum pixel expansions for threshold visual secret sharing schemes. IEEE Trans. Inf. Forensics Secur. 6(3–2), 960–969 (2011)

    Article  Google Scholar 

  19. Weir, J., Yan, W.: Sharing multiple secrets using visual cryptography. In: International Symposium on Circuits and Systems (ISCAS 2009), Taipei, Taiwan, 24–17 May 2009, pp. 509–512. IEEE (2009)

    Google Scholar 

  20. Yamaguchi, Y.: Extended visual cryptography scheme for multiple-secrets continuous-tone images. Trans. Data Hiding Multim. Secur. 9, 25–41 (2014)

    Article  MATH  Google Scholar 

  21. Yang, C., Laih, C.: New colored visual secret sharing schemes. Des. Codes Cryptogr. 20(3), 325–336 (2000)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Binh Le Thanh Thai .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Le Thanh Thai, B., Tanaka, H. (2023). A Study for Security of Visual Cryptography. In: El Hajji, S., Mesnager, S., Souidi, E.M. (eds) Codes, Cryptology and Information Security. C2SI 2023. Lecture Notes in Computer Science, vol 13874. Springer, Cham. https://doi.org/10.1007/978-3-031-33017-9_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-33017-9_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-33016-2

  • Online ISBN: 978-3-031-33017-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics