Abstract
Recently, Hou et al. Introduced a (2, n) block-based progressive visual cryptographic scheme (BPVCS), which the image blocks can be gradually recovered step by step. In Hou et al.’s (2, n)-BPVCS, a secret image is subdivided into n non-overlapped image blocks. When stacking any t (2 ≤ t ≤ n) shadows, the image blocks associated with these t participants will be recovered. Unfortunately, Hou et al.’s (2, n)-BVCPS suffers from the cheating problem, which any two dishonest participants might collude together to tamper their image blocks shared with other honest participants. Also, they can impersonate an honest participant to force other honest participants to reconstruct the wrong secret. In this paper, we solve the cheating problem and propose a cheating immune (2, n)-BPVCS.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Naor, M., Shamir, A.: Visual Cryptography. In: De Santis, Alfredo (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)
Ito, R., Kuwakado, H., Tanaka, H.: Image size invariant visual cryptography. IEICE Trans. Fundam. Electron. Commun. Comput. E82-A, 2172–2177 (1999)
Kuwakado, H., Tanaka, H.: Size-reduced visual secret sharing scheme. IEICE Trans. Fundam. Electron. Commun. Comput. E87-A, 1193–1197 (2004)
Yang, C.N.: New visual secret sharing schemes using probabilistic method. Pattern Recogn. Lett. 25, 481–494 (2004)
Yang, C.N., Chen, T.S.: Size-adjustable visual secret sharing schemes. IEICE Trans. Fundam. Electron. Commun. Comput. E88-A, 2471–2474 (2005)
Yang, C.N., Chen, T.S.: New size-reduced visual secret sharing schemes with half reduction of shadow size. IEICE Trans. Fundam. Electron. Commun. Comput. E89-A, 620–625 (2006)
Cimato, S., De Prisco, R., De Santis, A.: Probabilistic visual cryptography schemes. Comput. J. 49, 97–107 (2006)
Wang, D., Yi, F., Li, X.: Probabilistic visual secret sharing schemes for grey-scale images and color images. Inf. Sci. 181, 2189–2208 (2011)
Cimato, S., Yang, C.N.: Visual cryptography and secret image sharing. Taylor & Francis, CRC Press, Boca Raton (2011)
Hou, Y.C., Quan, Z.Y., Tsai, C.F., Tseng, A.Y.: Block-based progressive visual secret sharing. Inf. Sci. 233, 290–340 (2013)
Horng, G.B., Chen, T.G., Tsai, D.S.: Cheating in visual cryptography. Des. Codes Crypt. 38, 219–236 (2006)
Hu, C.M., Tzeng, W.G.: Cheating Prevention in Visual Cryptography. IEEE Trans. Image Process. 16, 36–45 (2007)
Wu, X., Sun, W.: Random grid-based visual secret sharing for general access structures with cheat-preventing ability. J. Syst. Softw. 85, 1119–1134 (2012)
Chen, Y.C., Horng, G.B., Tsai, D.S.: Comment on “cheating prevention in visual cryptography”. IEEE Trans. Image Process. 21, 3319–3323 (2012)
Chen, Y.C., Tsai, D.S., Horng, G.B.: A new authentication based cheating prevention scheme in Naor-Shamir’s visual cryptography. J. Vis. Commun. Image Represent. 23, 1225–1233 (2012)
Chen, Y.C., Tsai, D.S., Horng, G.B.: Visual secret sharing with cheating prevention revisited. Digital Sig. Process. Adv. (2013). doi:10.1016/j.dsp.2013.05.014. (Published)
Acknowledgment
This work was supported in part by the National Science Council under grant NSC 101-2221-E-259-028-. 102-2221-E-259-009-MY2.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yang, CN., Lin, YC., Wu, CC. (2014). Cheating Immune Block-Based Progressive Visual Cryptography. In: Shi, Y., Kim, HJ., Pérez-González, F. (eds) Digital-Forensics and Watermarking. IWDW 2013. Lecture Notes in Computer Science(), vol 8389. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43886-2_7
Download citation
DOI: https://doi.org/10.1007/978-3-662-43886-2_7
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-43885-5
Online ISBN: 978-3-662-43886-2
eBook Packages: Computer ScienceComputer Science (R0)