Abstract
Visual cryptographic scheme (VCS) has an attractive property of decoding that can be performed directly by the human visual system without any computation. This novel stacking-to-see property of VCS can be secure and cheap used for visual authentication in accessing a data base. In this paper, we design a new participant-specific VCS (PSVCS) to extend the authentication scenario from a single-client authentication in VCS-based authentication schemes to a group of clients with specific threshold property. The proposed (\(t, k, n\))-PSVCS, where \(t\, \le \,k \,\le\, n\), needs \(t\) specific participants and other (\(k-t\)) participants to decode the secret image. When compared with previous VCS-based authentication schemes, our PSVCS-based authentication can provide different privileges to clients and is more suitable for real environment.
Similar content being viewed by others
References
Naor, M., Shamir, A.: Visual cryptography. EUROCRYPT’94 LNCS 950, pp. 1–12. Springer, Berlin (1994)
Weir, J., Yan, W.: A comprehensive study of visual cryptography. Trans. DHMS V, LNCS 6010, 70–105 (2010)
Kuwakado, H., Tanaka, H.: Image size invariant visual cryptography. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 82, 2172–2177 (1999)
Yang, C.N.: New visual secret sharing schemes using probabilistic method. Pattern Recogn. Lett. 25, 481–494 (2004)
Cimato, S., De Prisco, R., De Santis, A.: Probabilistic visual cryptography schemes. Comput. J. 49, 97–107 (2006)
Shyu, S.J., Jiang, H.W.: General constructions for threshold multiple-secret visual cryptography schemes. IEEE Trans. Inform. Forensics Secur. 8, 733–743 (2013)
Yang, C.N., Yang, Y.Y.: New extended visual cryptography schemes with clearer shadow images. Inf. Sci. 271, 246–263 (2014)
Cimato, S., De Santis, A., Ferrara, A.L., Masucci, B.: Ideal contrast visual cryptography schemes with reversing. Inf. Process. Lett. 93, 199–206 (2005)
Liu, F., Wu, C.K., Lin, X.J.: The alignment problem of visual cryptography schemes. Des. Codes Cryptogr. 50, 215–227 (2009)
Hou, Y.C.: Visual cryptography for color image. Pattern Recognit. 36, 1619–1629 (2003)
Yang, C.N., Lin, P.W., Shih, H.W., Kim, C.: Aspect ratio invariant visual cryptography by image filtering and resizing. Pers. Ubiquit. Comput. 17, 843–850 (2013)
Yang, C.N., Shih, H.W., Wu, C.C., Harn, L.: k out of n region incrementing scheme in visual cryptography. IEEE Trans. Circ. Syst. Video Technol. 22, 779–810 (2012)
Hou, Y.C., Quan, Z.Y., Tsai, C.F., Tseng, A.Y.: Block-based progressive visual secret sharing. Inf. Sci. 233, 290–304 (2013)
Yang, C.N., Wang, D.: Property analysis of XOR based visual cryptography. IEEE Trans. Circ. Syst. Video Technol. 24, 189–197 (2014)
Naor, M., Pinkas, B.: Visual authentication and identification. CRYPTO LNCS 1294, 322–336 (1997)
McCune J.M., Perrig A.: Reiter M. K., Seeing-is-believing: using camera phones for human-verifiable authentication, IEEE symposium security privacy, pp. 110–124, 2005
Jaya, S., Malik, A., Aggarwal, A.: Sardana, Novel authentication system using visual cryptography, information and communication technologies (WICT) pp. 1181–1186 (2011)
Goel, M.B., Bhagat, V.B., Katankar, V.K.: Authentication framework using visual cryptography. Int. J. Res. Eng. Technol. 2, 271–274 (2013)
Ratheesh, V.R., Jogesh, J., Jayamohan, M.: A visual cryptographic scheme for owner authentication using embedded shares. Indian J. Comput. Sci. Eng. 5, 190–194 (2014)
Yang, C.N., Li, P., Wu, C.C., Cai, S.R.: Reducing shadow size in essential secret image sharing by conjunctive hierarchical approach. Signal Process. Image Commun. 31, 1–9 (2015)
Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual cryptography for general access structures. Inf. Comput. 129, 86–106 (1996)
http://krebsonsecurity.com/2014/12/fbi-north-korea-to-blame-for-sony-hack/. Accessed 20 Dec 2014
Acknowledgments
This research was supported in part by Ministry of Science and Technology, under Grant 102-2221-E-259 -009 -MY2 and 103-2221-E-259-015. This research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) by the Ministry of Education, Science and Technology (20120192).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Yang, CN., Sun, LZ., Yan, X. et al. Design a new visual cryptography for human-verifiable authentication in accessing a database. J Real-Time Image Proc 12, 483–494 (2016). https://doi.org/10.1007/s11554-015-0511-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11554-015-0511-9