Skip to main content
Log in

Design a new visual cryptography for human-verifiable authentication in accessing a database

  • Special Issue Paper
  • Published:
Journal of Real-Time Image Processing Aims and scope Submit manuscript

Abstract

Visual cryptographic scheme (VCS) has an attractive property of decoding that can be performed directly by the human visual system without any computation. This novel stacking-to-see property of VCS can be secure and cheap used for visual authentication in accessing a data base. In this paper, we design a new participant-specific VCS (PSVCS) to extend the authentication scenario from a single-client authentication in VCS-based authentication schemes to a group of clients with specific threshold property. The proposed (\(t, k, n\))-PSVCS, where \(t\, \le \,k \,\le\, n\), needs \(t\) specific participants and other (\(k-t\)) participants to decode the secret image. When compared with previous VCS-based authentication schemes, our PSVCS-based authentication can provide different privileges to clients and is more suitable for real environment.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Naor, M., Shamir, A.: Visual cryptography. EUROCRYPT’94 LNCS 950, pp. 1–12. Springer, Berlin (1994)

    Google Scholar 

  2. Weir, J., Yan, W.: A comprehensive study of visual cryptography. Trans. DHMS V, LNCS 6010, 70–105 (2010)

    Google Scholar 

  3. Kuwakado, H., Tanaka, H.: Image size invariant visual cryptography. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 82, 2172–2177 (1999)

    Google Scholar 

  4. Yang, C.N.: New visual secret sharing schemes using probabilistic method. Pattern Recogn. Lett. 25, 481–494 (2004)

    Article  Google Scholar 

  5. Cimato, S., De Prisco, R., De Santis, A.: Probabilistic visual cryptography schemes. Comput. J. 49, 97–107 (2006)

    Article  Google Scholar 

  6. Shyu, S.J., Jiang, H.W.: General constructions for threshold multiple-secret visual cryptography schemes. IEEE Trans. Inform. Forensics Secur. 8, 733–743 (2013)

    Article  Google Scholar 

  7. Yang, C.N., Yang, Y.Y.: New extended visual cryptography schemes with clearer shadow images. Inf. Sci. 271, 246–263 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  8. Cimato, S., De Santis, A., Ferrara, A.L., Masucci, B.: Ideal contrast visual cryptography schemes with reversing. Inf. Process. Lett. 93, 199–206 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  9. Liu, F., Wu, C.K., Lin, X.J.: The alignment problem of visual cryptography schemes. Des. Codes Cryptogr. 50, 215–227 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  10. Hou, Y.C.: Visual cryptography for color image. Pattern Recognit. 36, 1619–1629 (2003)

    Article  Google Scholar 

  11. Yang, C.N., Lin, P.W., Shih, H.W., Kim, C.: Aspect ratio invariant visual cryptography by image filtering and resizing. Pers. Ubiquit. Comput. 17, 843–850 (2013)

    Article  Google Scholar 

  12. Yang, C.N., Shih, H.W., Wu, C.C., Harn, L.: k out of n region incrementing scheme in visual cryptography. IEEE Trans. Circ. Syst. Video Technol. 22, 779–810 (2012)

    Google Scholar 

  13. Hou, Y.C., Quan, Z.Y., Tsai, C.F., Tseng, A.Y.: Block-based progressive visual secret sharing. Inf. Sci. 233, 290–304 (2013)

    Article  Google Scholar 

  14. Yang, C.N., Wang, D.: Property analysis of XOR based visual cryptography. IEEE Trans. Circ. Syst. Video Technol. 24, 189–197 (2014)

    Article  Google Scholar 

  15. Naor, M., Pinkas, B.: Visual authentication and identification. CRYPTO LNCS 1294, 322–336 (1997)

    MATH  Google Scholar 

  16. McCune J.M., Perrig A.: Reiter M. K., Seeing-is-believing: using camera phones for human-verifiable authentication, IEEE symposium security privacy, pp. 110–124, 2005

  17. Jaya, S., Malik, A., Aggarwal, A.: Sardana, Novel authentication system using visual cryptography, information and communication technologies (WICT) pp. 1181–1186 (2011)

  18. Goel, M.B., Bhagat, V.B., Katankar, V.K.: Authentication framework using visual cryptography. Int. J. Res. Eng. Technol. 2, 271–274 (2013)

    Google Scholar 

  19. Ratheesh, V.R., Jogesh, J., Jayamohan, M.: A visual cryptographic scheme for owner authentication using embedded shares. Indian J. Comput. Sci. Eng. 5, 190–194 (2014)

    Google Scholar 

  20. Yang, C.N., Li, P., Wu, C.C., Cai, S.R.: Reducing shadow size in essential secret image sharing by conjunctive hierarchical approach. Signal Process. Image Commun. 31, 1–9 (2015)

    Article  Google Scholar 

  21. Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual cryptography for general access structures. Inf. Comput. 129, 86–106 (1996)

    Article  MathSciNet  MATH  Google Scholar 

  22. http://krebsonsecurity.com/2014/12/fbi-north-korea-to-blame-for-sony-hack/. Accessed 20 Dec 2014

Download references

Acknowledgments

This research was supported in part by Ministry of Science and Technology, under Grant 102-2221-E-259 -009 -MY2 and 103-2221-E-259-015. This research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) by the Ministry of Education, Science and Technology (20120192).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cheonshik Kim.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yang, CN., Sun, LZ., Yan, X. et al. Design a new visual cryptography for human-verifiable authentication in accessing a database. J Real-Time Image Proc 12, 483–494 (2016). https://doi.org/10.1007/s11554-015-0511-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11554-015-0511-9

Keywords

Navigation