Visual secret sharing with cheating prevention revisited

被引:15
|
作者
Chen, Yu-Chi [1 ]
Tsai, Du-Shiau [2 ]
Horng, Gwoboa [1 ]
机构
[1] Natl Chung Hsing Univ, Dept Comp Sci & Engn, Taichung 40227, Taiwan
[2] Hsiuping Univ Sci & Technol, Dept Informat Networking Technol, Taipei, Taiwan
关键词
Visual secret sharing; Secret sharing; Cheating; Cheating prevention; Security; CRYPTOGRAPHY; SCHEME; IMAGES;
D O I
10.1016/j.dsp.2013.05.014
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Visual secret sharing (VSS) is a variant form of secret sharing, and is efficient since secret decoding only depends on the human vision system. However, cheating in VSS, first showed by Horng et al., is a significant issue like a limelight. Since then, plenty of studies for cheating activities and cheating prevention visual secret sharing (CPVSS) schemes have been introduced. In this paper, we revisit some well-known cheating activities and CPVSS schemes, and then categorize cheating activities into meaningful cheating, non-meaningful cheating, and meaningful deterministic cheating. Moreover, we analyze the research challenges in CPVSS, and propose a new cheating prevention scheme which is better than the previous schemes in the aspects of some security requirements. (C) 2013 Elsevier Inc. All rights reserved.
引用
收藏
页码:1496 / 1504
页数:9
相关论文
共 50 条
  • [1] Cheating prevention in linear secret sharing
    Pieprzyk, J
    Zhang, XM
    [J]. INFORMATION SECURITY AND PRIVACY, 2002, 2384 : 121 - 135
  • [2] Cheating Immune Threshold Visual Secret Sharing
    De Prisco, Roberto
    De Santis, Alfredo
    [J]. COMPUTER JOURNAL, 2010, 53 (09): : 1485 - 1496
  • [3] Multi-factor cheating prevention in visual secret sharing by hybrid codebooks
    Lin, Chih-Hung
    Chen, Tzung-Her
    Wu, Yan-Ting
    Tsao, Kai-Hsiang
    Lin, Kai-Siang
    [J]. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2014, 25 (07) : 1543 - 1557
  • [4] Cheating on a Visual Secret Sharing Scheme under a Realistic Scenario
    Lumyong, Pichanee
    Iwamoto, Mitsugu
    Ohta, Kazuo
    [J]. 2014 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA), 2014, : 575 - 579
  • [5] Efficient Secret Image Sharing Scheme with Authentication and Cheating Prevention
    Zhang, Lina
    Dang, Xuan
    Feng, Li
    Yang, Junhan
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2021, 2021
  • [6] Cheating immune (2, n)-threshold visual secret sharing
    De Prisco, Roberto
    De Santis, Alfredo
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PROCEEDINGS, 2006, 4116 : 216 - 228
  • [7] Visual secret sharing by random grids revisited
    Chen, Tzung-Her
    Tsao, Kai-Hsiang
    [J]. PATTERN RECOGNITION, 2009, 42 (09) : 2203 - 2217
  • [8] On cheating immune secret sharing
    Pieprzyk, J
    Zhang, XM
    [J]. DISCRETE MATHEMATICS AND THEORETICAL COMPUTER SCIENCE, 2004, 6 (02): : 253 - 264
  • [9] Cheating Resistance for Secret Sharing
    Chan, Chao-Wen
    Chang, Chin-Chen
    Wang, Zhi-Hui
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 840 - +