An efficient XOR-based verifiable visual cryptographic scheme

被引:13
|
作者
Jia, Xingxing [1 ]
Wang, Daoshun [2 ]
Chu, Qimeng [1 ]
Chen, Zhenhua [3 ]
机构
[1] Lanzhou Univ, Sch Math & Stat, Lanzhou, Gansu, Peoples R China
[2] Tsinghua Univ, Sch Comp, Beijing, Peoples R China
[3] Xian Univ Sci & Technol, Sch Comp Sci & Technol, Xian, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Visual cryptography; Verifiable visual cryptographic scheme; Pixel expansion; CHEATING PREVENTION;
D O I
10.1007/s11042-018-6779-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Visual cryptographic (VC) schemes have been widely used in secure multimedia systems for data transmission and data storage. It divides a secret image into n random-seemingly share images printed on the transparencies. Superimposing the designed shares will display the recovered secret image which can be recognized by human visual system. It is very convenient to decode the secret since it requires no cryptographic knowledge and computation. However, there is a high chance for dishonest shareholders to present faked shares in the secret reconstruction phase, which would result in a huge damage to the honest shareholders. In this article, a secure approach to verify the cheating shares has been proposed to achieve fair reconstruction of the image secret. It is designed to share a verification image among the original shares of the XOR based VC scheme. It only increases pixel expansion by one to achieve the verification function. Cheating detection ability is attained by pairwise superimposing the shares so that any cheating behavior can be detected by the honest participant. The secret image is recovered and its recovered contrast becomes 1times of the original contrast where m denotes the pixel expansion of the original scheme. The verification image is probabilistically recovered and its recovered contrast is 12(m+1) Compared with traditional verifiable (k,n)-VC schemes against cheating, it overcomes the drawbacks such as requiring additional shares, additional large pixel expansion, or lower contrast. The experimental results show that the visual quality of the recovered secret image is as good as expected. The security analysis and comparative results based on various aspects of VC schemes demonstrate the better efficiency of the proposed approach over existing schemes.
引用
收藏
页码:8207 / 8223
页数:17
相关论文
共 50 条
  • [1] An efficient XOR-based verifiable visual cryptographic scheme
    Xingxing Jia
    Daoshun Wang
    Qimeng Chu
    Zhenhua Chen
    [J]. Multimedia Tools and Applications, 2019, 78 : 8207 - 8223
  • [2] Verifiable XOR-based visual secret sharing scheme for hyperspectral images
    Srujana, Oruganti Sai
    Mhala, Nikhil C.
    Pais, Alwyn R.
    [J]. JOURNAL OF APPLIED REMOTE SENSING, 2021, 15 (01)
  • [3] An efficient XOR-based visual cryptography scheme with lossless reconfigurable algorithms
    Wang, Huan
    Jiang, Zhongyuan
    Qian, Qing
    Wang, Hong
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2022, 18 (04)
  • [4] XOR-based visual cryptography scheme with essential shadows
    Li, Peng
    Yin, Liping
    Ma, Jianfeng
    Wang, Hongtao
    [J]. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2022, 85
  • [5] Perfect recovery of XOR-based visual cryptography scheme
    Fu, Zhengxin
    Cheng, Yuqiao
    Yu, Bin
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (02) : 2367 - 2384
  • [6] Perfect recovery of XOR-based visual cryptography scheme
    Zhengxin Fu
    Yuqiao Cheng
    Bin Yu
    [J]. Multimedia Tools and Applications, 2019, 78 : 2367 - 2384
  • [7] A Verifiable Visual Cryptography Scheme Based on XOR Algorithm
    Han, Yanyan
    Dong, Haocong
    He, Wencai
    Liu, Juan
    [J]. PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 673 - 677
  • [8] XOR-Based Visual Cryptographic Schemes With Monotonously Increasing and Flawless Reconstruction Properties
    Shyu, Shyong Jian
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2018, 28 (09) : 2397 - 2401
  • [9] On the generality of (k, n) XOR-based Visual Cryptography Scheme
    Shen, Gang
    Fu, Zheng-Xin
    Yu, Bin
    [J]. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2013, 35 (10): : 2294 - 2300
  • [10] XOR-based unexpanded meaningful visual secret sharing scheme
    Kannojia, Suresh Prasad
    Kumar, Jasvant
    [J]. International Journal of Security and Networks, 2019, 14 (01) : 1 - 9