A Verifiable Visual Cryptography Scheme Based on XOR Algorithm

被引:0
|
作者
Han, Yanyan [1 ]
Dong, Haocong [2 ]
He, Wencai [1 ]
Liu, Juan [2 ]
机构
[1] Beijing Elect Sci & Technol Inst, Dept Sci Res, Beijing 100070, Peoples R China
[2] Xidian Univ, Commun Engn Dept, Xian, Peoples R China
关键词
Visual Cryptography; cheater; verifiable; no pixel expansion;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Visual Cryptography is the same as other secret sharing schemes, which also has the problem of deception. The cheater can destroy the recovery of secret image or gain secret information by cheating through making a counterfeiter of share images. In this paper, in order to resolve the problem of deception, we proposed a verifiable visual cryptography scheme can ensure that the secret image can be visually revealed correctly. This scheme can check and verify the accuracy and truthfulness of every share image, which is simple to decrypt and without any pixel expansion.
引用
收藏
页码:673 / 677
页数:5
相关论文
共 50 条
  • [1] A verifiable visual cryptography scheme
    Han, Yan-Yan
    Wang, Su-Ying
    Hu, Yu-Pu
    He, Wen-Cai
    Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology, 2009, 31 (01): : 86 - 89
  • [2] A Verifiable Visual Cryptography Scheme
    Yu, Bin
    Fang, Liguo
    Xu, Xiaohui
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 908 - 911
  • [3] Optimization of XOR Visual Cryptography Scheme
    Shi, Lin
    Yu, Bin
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 297 - 301
  • [4] An efficient XOR-based verifiable visual cryptographic scheme
    Jia, Xingxing
    Wang, Daoshun
    Chu, Qimeng
    Chen, Zhenhua
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (07) : 8207 - 8223
  • [5] An efficient XOR-based verifiable visual cryptographic scheme
    Xingxing Jia
    Daoshun Wang
    Qimeng Chu
    Zhenhua Chen
    Multimedia Tools and Applications, 2019, 78 : 8207 - 8223
  • [6] XOR-based visual cryptography scheme with essential shadows
    Li, Peng
    Yin, Liping
    Ma, Jianfeng
    Wang, Hongtao
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2022, 85
  • [7] Perfect recovery of XOR-based visual cryptography scheme
    Zhengxin Fu
    Yuqiao Cheng
    Bin Yu
    Multimedia Tools and Applications, 2019, 78 : 2367 - 2384
  • [8] Perfect recovery of XOR-based visual cryptography scheme
    Fu, Zhengxin
    Cheng, Yuqiao
    Yu, Bin
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (02) : 2367 - 2384
  • [9] On the generality of (k, n) XOR-based Visual Cryptography Scheme
    Shen, Gang
    Fu, Zheng-Xin
    Yu, Bin
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2013, 35 (10): : 2294 - 2300
  • [10] Verifiable XOR-based visual secret sharing scheme for hyperspectral images
    Srujana, Oruganti Sai
    Mhala, Nikhil C.
    Pais, Alwyn R.
    JOURNAL OF APPLIED REMOTE SENSING, 2021, 15 (01)