skip to main content
survey

Improved Random Grid-based Cheating Prevention Visual Cryptography Using Latin Square

Published: 15 March 2023 Publication History

Abstract

Visual cryptography scheme is a method of encrypting secret image into n noiselike shares. The secret image can be reconstructed by stacking adequate shares. In the past two decades, many schemes have been proposed to realize the cheating prevention visual cryptography scheme (CPVCS). Significantly, Ren et al. [9] first introduced the idea of CPVCS with the help of Latin square. Inspired by their work, in this article, a new reliable scheme is proposed. More precisely, to facilitate the certification process, we embed meaningful characters into the randomly chosen authentication patterns in each divided blocks. Furthermore, we fix the security vulnerability in the stacked results of share Sg and verification Verg, where 1≤ gn. Since the improved scheme encrypts the secret image by utilizing random grids, the generated shares have no pixel expansion. Finally, theoretical analysis and experimental results are conducted to evaluate the efficiency and security of the proposed scheme.

References

[1]
C. C. Chang, T. Chen, and L. J. Liu. 2009. Preventing cheating in computational visual cryptography. Fundam. Inf. 92, 1–2 (2009), 27–42.
[2]
T. Chen and K. Tsao. 2011. Threshold visual secret sharing by random grids. J. Syst. Softw. 84, 7 (2011), 1197–1208.
[3]
P. Y. Lin, R. Z. Wang, Y. J. Chang, and W. P. Fang. 2015. Prevention of cheating in visual cryptography by using coherent patterns. Inf. Sci. 301, (2015), 61–74.
[4]
F. Liu, C. K. Wu and X. J. Lin. 2011. Cheating immune visual cryptography scheme. IET Inf. Secur. 5, 1 (2011), 51–59.
[5]
G. Horng, T. Chen, and D. S. Tsai. 2006. Cheating in visual cryptography. Des. Codes Cryptogr. 38, 2 (2006), 219–236.
[6]
H. Hu, G. Shen, Z. X. Fu, and B. Yu. 2018. Improved contrast for threshold random-grid-based visual cryptography. KSII Trans. Internet Inf. Syst. 12, 7 (2018), 3401–3420.
[7]
C. M. Hu and W. G. Tzeng. 2007. Cheating prevention in visual cryptography. IEEE Trans. Image Process. 16, 1 (2007), 36–45.
[8]
M. Naor and A. Shamir. 1994. Visual cryptography. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT’94), Lecture Notes in Computer Science, Vol. 950. 1–12.
[9]
Y. W. Ren, F. Liu, T. Guo, R. Q. Feng, and D. D. Lin. 2017. Cheating prevention visual cryptography scheme using latin square. IET Inf. Secur. 11, 4 (2017), 211–219.
[10]
S. J. Shyu. 2009. Image encryption by multiple random grids. Pattern Recogn. 40, 3 (2009), 1014–1031.
[11]
D. S. Tsai, T. Chen, and G. Horng. 2007. A cheating prevention scheme for binary visual cryptography with homogeneous secret images. Pattern Recogn. 40, 8 (2007), 2356–2366.
[12]
O. Kafri and E. Keren. 1987. Encryption of pictures and shapes by random grids. Opt. Lett. 12, 6 (1987), 377–379.
[13]
X. H. Yan and Y. L. Lu. 2017. Contrast-improved visual secret sharing based on random grid for general access structure. Digit. Sign. Process. 71, (2017), 36–45.
[14]
C. N. Yang, Y. C. Lin, and P. Li. 2020. Cheating immune k-out-of-n block-based progressive visual cryptography. J. Inf. Secur. Appl. 55 (2020), 102660.
[15]
X. H. Yan, X. Liu, and C. N. Yang. 2018. An enhanced threshold visual secret sharing based on random grids. J. Real-Time Image Process. 14, 1 (2018), 61–73.
[16]
M. Yadav. 2020. Ranvijay: Cheating prevention and detection technique in visual secret sharing. Ingén. Syst. d’Inf. 25, 4 (2020), 453–460.
[17]
C. N. Yang, C. C. Wu, and D. S. Wang. 2014. A discussion on the relationship between probabilistic visual cryptography and random grid. Inf. Sci. 278 (2014), 141–173.
[18]
Y. K. Zhao and F.-W. Fu. 2022. A contrast improved or and xor based \((k,n)\) visual cryptography scheme without pixel expansion. J. Vis. Commun. Image Represent. 82 (2022), 103408.
[19]
Y. K. Zhao and F.-W. Fu. 2022. A cheating immune \((k,n)\) visual cryptography scheme by using the rotation of shares. Multimedia Tools Appl. 81, 5 (2022), 6235–6257.

Cited By

View all
  • (2024)EVCS-DAS: Evolving Visual Cryptography Schemes for Dynamic Access StructuresACM Transactions on Multimedia Computing, Communications, and Applications10.1145/370854721:3(1-27)Online publication date: 14-Dec-2024
  • (2024)Vulnerability Detection and Improvements of an Image Cryptosystem for Real-Time Visual ProtectionACM Transactions on Multimedia Computing, Communications, and Applications10.1145/370854621:3(1-23)Online publication date: 14-Dec-2024
  • (2024)Enabling 6D Pose Tracking on Your Acoustic DevicesProceedings of the 22nd Annual International Conference on Mobile Systems, Applications and Services10.1145/3643832.3661875(15-28)Online publication date: 3-Jun-2024
  • Show More Cited By

Index Terms

  1. Improved Random Grid-based Cheating Prevention Visual Cryptography Using Latin Square

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Multimedia Computing, Communications, and Applications
    ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 19, Issue 2s
    April 2023
    545 pages
    ISSN:1551-6857
    EISSN:1551-6865
    DOI:10.1145/3572861
    • Editor:
    • Abdulmotaleb El Saddik
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 15 March 2023
    Online AM: 03 August 2022
    Accepted: 05 July 2022
    Revised: 08 April 2022
    Received: 24 September 2021
    Published in TOMM Volume 19, Issue 2s

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Visual cryptography
    2. cheating prevention
    3. random grid
    4. threshold
    5. Latin square

    Qualifiers

    • Survey

    Funding Sources

    • National Key Research and Development Program of China
    • National Natural Science Foundation of China
    • Natural Science Foundation of Tianjin
    • National Science Foundation of China
    • State Key Laboratory of information Security, Institute of Information Engineering Chinese Academy of Sciences

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)59
    • Downloads (Last 6 weeks)3
    Reflects downloads up to 17 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)EVCS-DAS: Evolving Visual Cryptography Schemes for Dynamic Access StructuresACM Transactions on Multimedia Computing, Communications, and Applications10.1145/370854721:3(1-27)Online publication date: 14-Dec-2024
    • (2024)Vulnerability Detection and Improvements of an Image Cryptosystem for Real-Time Visual ProtectionACM Transactions on Multimedia Computing, Communications, and Applications10.1145/370854621:3(1-23)Online publication date: 14-Dec-2024
    • (2024)Enabling 6D Pose Tracking on Your Acoustic DevicesProceedings of the 22nd Annual International Conference on Mobile Systems, Applications and Services10.1145/3643832.3661875(15-28)Online publication date: 3-Jun-2024
    • (2024)Implementing Full Threshold Secret Sharing Scheme by Finite Field Arithmetic2024 4th International Symposium on Computer Technology and Information Science (ISCTIS)10.1109/ISCTIS63324.2024.10698812(899-903)Online publication date: 12-Jul-2024
    • (2023)Visual Secret Sharing of Gray and Color Images using Fuzzy Random GridsApplied Soft Computing10.1016/j.asoc.2023.110648146:COnline publication date: 17-Oct-2023

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    Full Text

    HTML Format

    View this article in HTML Format.

    HTML Format

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media