Skip to main content

Cheating Immune Block-Based Progressive Visual Cryptography

  • Conference paper
  • First Online:
Digital-Forensics and Watermarking (IWDW 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8389))

Included in the following conference series:

  • 1674 Accesses

Abstract

Recently, Hou et al. Introduced a (2, n) block-based progressive visual cryptographic scheme (BPVCS), which the image blocks can be gradually recovered step by step. In Hou et al.’s (2, n)-BPVCS, a secret image is subdivided into n non-overlapped image blocks. When stacking any t (2 ≤ t ≤ n) shadows, the image blocks associated with these t participants will be recovered. Unfortunately, Hou et al.’s (2, n)-BVCPS suffers from the cheating problem, which any two dishonest participants might collude together to tamper their image blocks shared with other honest participants. Also, they can impersonate an honest participant to force other honest participants to reconstruct the wrong secret. In this paper, we solve the cheating problem and propose a cheating immune (2, n)-BPVCS.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Naor, M., Shamir, A.: Visual Cryptography. In: De Santis, Alfredo (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  2. Ito, R., Kuwakado, H., Tanaka, H.: Image size invariant visual cryptography. IEICE Trans. Fundam. Electron. Commun. Comput. E82-A, 2172–2177 (1999)

    Google Scholar 

  3. Kuwakado, H., Tanaka, H.: Size-reduced visual secret sharing scheme. IEICE Trans. Fundam. Electron. Commun. Comput. E87-A, 1193–1197 (2004)

    Google Scholar 

  4. Yang, C.N.: New visual secret sharing schemes using probabilistic method. Pattern Recogn. Lett. 25, 481–494 (2004)

    Article  Google Scholar 

  5. Yang, C.N., Chen, T.S.: Size-adjustable visual secret sharing schemes. IEICE Trans. Fundam. Electron. Commun. Comput. E88-A, 2471–2474 (2005)

    Google Scholar 

  6. Yang, C.N., Chen, T.S.: New size-reduced visual secret sharing schemes with half reduction of shadow size. IEICE Trans. Fundam. Electron. Commun. Comput. E89-A, 620–625 (2006)

    Google Scholar 

  7. Cimato, S., De Prisco, R., De Santis, A.: Probabilistic visual cryptography schemes. Comput. J. 49, 97–107 (2006)

    Article  Google Scholar 

  8. Wang, D., Yi, F., Li, X.: Probabilistic visual secret sharing schemes for grey-scale images and color images. Inf. Sci. 181, 2189–2208 (2011)

    Article  MATH  MathSciNet  Google Scholar 

  9. Cimato, S., Yang, C.N.: Visual cryptography and secret image sharing. Taylor & Francis, CRC Press, Boca Raton (2011)

    Google Scholar 

  10. Hou, Y.C., Quan, Z.Y., Tsai, C.F., Tseng, A.Y.: Block-based progressive visual secret sharing. Inf. Sci. 233, 290–340 (2013)

    Article  Google Scholar 

  11. Horng, G.B., Chen, T.G., Tsai, D.S.: Cheating in visual cryptography. Des. Codes Crypt. 38, 219–236 (2006)

    Article  MATH  MathSciNet  Google Scholar 

  12. Hu, C.M., Tzeng, W.G.: Cheating Prevention in Visual Cryptography. IEEE Trans. Image Process. 16, 36–45 (2007)

    Article  MATH  MathSciNet  Google Scholar 

  13. Wu, X., Sun, W.: Random grid-based visual secret sharing for general access structures with cheat-preventing ability. J. Syst. Softw. 85, 1119–1134 (2012)

    Article  MathSciNet  Google Scholar 

  14. Chen, Y.C., Horng, G.B., Tsai, D.S.: Comment on “cheating prevention in visual cryptography”. IEEE Trans. Image Process. 21, 3319–3323 (2012)

    Article  MathSciNet  Google Scholar 

  15. Chen, Y.C., Tsai, D.S., Horng, G.B.: A new authentication based cheating prevention scheme in Naor-Shamir’s visual cryptography. J. Vis. Commun. Image Represent. 23, 1225–1233 (2012)

    Article  Google Scholar 

  16. Chen, Y.C., Tsai, D.S., Horng, G.B.: Visual secret sharing with cheating prevention revisited. Digital Sig. Process. Adv. (2013). doi:10.1016/j.dsp.2013.05.014. (Published)

    Google Scholar 

Download references

Acknowledgment

This work was supported in part by the National Science Council under grant NSC 101-2221-E-259-028-. 102-2221-E-259-009-MY2.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ching-Nung Yang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yang, CN., Lin, YC., Wu, CC. (2014). Cheating Immune Block-Based Progressive Visual Cryptography. In: Shi, Y., Kim, HJ., Pérez-González, F. (eds) Digital-Forensics and Watermarking. IWDW 2013. Lecture Notes in Computer Science(), vol 8389. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43886-2_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-43886-2_7

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-43885-5

  • Online ISBN: 978-3-662-43886-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics