3-Out-of-n Cheating Prevention Visual Cryptographic Schemes

Ching-Nung Yang, Stelvio Cimato, Jihi-Han Wu, Song-Ruei Cai

2016

Abstract

In literature, (2, n) cheating prevention visual cryptographic schemes (CPVCSs) have been proposed, dealing with the case of dishonest participants, called cheaters, who can collude together to force honest participants to reconstruct a wrong secret. While (2, n)-CPVCSs resistant to deterministic cheating have been presented, the problem of defining (k, n)-CPVCS for any k has not been solved. In this paper, we discuss (3, n)-CPVCS, and propose three (3, n)-CPVCSs with different cheating prevention capabilities. To show the effectiveness of the presented (3, n)-CPVCS, some experimental results are discussed as well.

References

  1. Cimato, S., De Prisco, R., & De Santis, A. (2006). Probabilistic Visual Cryptography Schemes. The Computer Journal, 49(1), 97-107.
  2. De Prisco, R., & De Santis, A. (2009). Cheating Immune Threshold Visual Secret Sharing. The Computer Journal, 53(9), 1485-1496.
  3. Horng, G., Chen, T., & Tsai, D. (2006). Cheating in Visual Cryptography. Design Codes and Cryptography, 38(2), 219-236.
  4. Hu, C., & Tzeng, W. (2007). Cheating Prevention in Visual Cryptography. IEEE Transactions on Image Processing, 16(1), 36-45.
  5. Ito, I., Kuwakado, H., & Tanaka, H. (1999). Image size invariant visual cryptography. IEICE Transaction on Fundamentals of Electronic communications and Computation Sciences, E82-A, 2172-2177.
  6. Kuwakado, H., & Tanaka, H. (2007). Size reduced visual secret sharing scheme. IEICE Transaction on Fundamentals of Electronic communications and Computation Sciences, E87-A, 1193-1197.
  7. Liu, F., Wu, C., & Lin, X. (2011). Cheating immune visual cryptography scheme. IET Information Security, 5, 51-59.
  8. Naor, M., & Shamir, A. (1994). Visual cryptography. Advances in Cryptology "EUROCRYPT'94". Lecture Notes in Computer Science vol.950, p. 1-12. Perugia: Springer.
  9. Tsai, D., Chen, T., & Horng. (2007). A cheating prevention scheme for binary visual cryptography with homogeneous secret images. Pattern Recognition, 40(8), 2356-2366.
  10. Wang, D., Yi, F., & Li, X. (2011). Probabilistic visual secret sharing schemes for grey-scale images and color images. Information Sciences, 181(11), 2189-2208.
  11. Yan, X., Wang, S., Niu, X., & Yang, C. (2015). Generalized random grids-based threshold visual cryptography with meaningful shares. Signal Processing, 109, 317-333.
  12. Yang, C. (2004). New visual secret sharing schemes using probabilistic method. Pattern Recognition Letters, 25(4), 481-494.
Download


Paper Citation


in Harvard Style

Yang C., Cimato S., Wu J. and Cai S. (2016). 3-Out-of-n Cheating Prevention Visual Cryptographic Schemes . In Proceedings of the 2nd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-167-0, pages 400-406. DOI: 10.5220/0005740504000406


in Bibtex Style

@conference{icissp16,
author={Ching-Nung Yang and Stelvio Cimato and Jihi-Han Wu and Song-Ruei Cai},
title={3-Out-of-n Cheating Prevention Visual Cryptographic Schemes},
booktitle={Proceedings of the 2nd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2016},
pages={400-406},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005740504000406},
isbn={978-989-758-167-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 2nd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - 3-Out-of-n Cheating Prevention Visual Cryptographic Schemes
SN - 978-989-758-167-0
AU - Yang C.
AU - Cimato S.
AU - Wu J.
AU - Cai S.
PY - 2016
SP - 400
EP - 406
DO - 10.5220/0005740504000406