An efficient XOR-based verifiable visual cryptographic scheme

被引:13
|
作者
Jia, Xingxing [1 ]
Wang, Daoshun [2 ]
Chu, Qimeng [1 ]
Chen, Zhenhua [3 ]
机构
[1] Lanzhou Univ, Sch Math & Stat, Lanzhou, Gansu, Peoples R China
[2] Tsinghua Univ, Sch Comp, Beijing, Peoples R China
[3] Xian Univ Sci & Technol, Sch Comp Sci & Technol, Xian, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Visual cryptography; Verifiable visual cryptographic scheme; Pixel expansion; CHEATING PREVENTION;
D O I
10.1007/s11042-018-6779-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Visual cryptographic (VC) schemes have been widely used in secure multimedia systems for data transmission and data storage. It divides a secret image into n random-seemingly share images printed on the transparencies. Superimposing the designed shares will display the recovered secret image which can be recognized by human visual system. It is very convenient to decode the secret since it requires no cryptographic knowledge and computation. However, there is a high chance for dishonest shareholders to present faked shares in the secret reconstruction phase, which would result in a huge damage to the honest shareholders. In this article, a secure approach to verify the cheating shares has been proposed to achieve fair reconstruction of the image secret. It is designed to share a verification image among the original shares of the XOR based VC scheme. It only increases pixel expansion by one to achieve the verification function. Cheating detection ability is attained by pairwise superimposing the shares so that any cheating behavior can be detected by the honest participant. The secret image is recovered and its recovered contrast becomes 1times of the original contrast where m denotes the pixel expansion of the original scheme. The verification image is probabilistically recovered and its recovered contrast is 12(m+1) Compared with traditional verifiable (k,n)-VC schemes against cheating, it overcomes the drawbacks such as requiring additional shares, additional large pixel expansion, or lower contrast. The experimental results show that the visual quality of the recovered secret image is as good as expected. The security analysis and comparative results based on various aspects of VC schemes demonstrate the better efficiency of the proposed approach over existing schemes.
引用
收藏
页码:8207 / 8223
页数:17
相关论文
共 50 条
  • [21] A novel perfect contrast XOR-based visual cryptography scheme for multiple secrets
    Shu-Mei Liu
    Hong-Mei Yang
    Jeng-Shyang Pan
    Tao Liu
    Bin Yan
    Multimedia Tools and Applications, 2022, 81 : 43125 - 43143
  • [22] XOR-Based Hierarchical Secret Sharing Scheme
    Shima, Koji
    Doi, Hiroshi
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2018, 2018, 11049 : 206 - 223
  • [23] A (2,2) XOR-based visual cryptography scheme without pixel expansion
    Vizcarra Melgar, Max E.
    Farias, Mylene C. Q.
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2019, 63
  • [24] Efficient Encoding Schedules for XOR-Based Erasure Codes
    Luo, Jianqiang
    Shrestha, Mochan
    Xu, Lihao
    Plank, James S.
    IEEE TRANSACTIONS ON COMPUTERS, 2014, 63 (09) : 2259 - 2272
  • [25] An XOR-based Progressive Visual Cryptography with Meaningful Shares
    Chiu, Pei-Ling
    Lee, Kai-Hui
    2016 FIRST IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND THE INTERNET (ICCCI 2016), 2016, : 362 - 365
  • [26] Maximizing Contrast in XOR-Based Visual Cryptography Schemes
    Jia, Xingxing
    Yu, Ting
    Luo, Xiangyang
    Wang, Daoshun
    Zhou, Huiyu
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2024, 34 (12) : 12849 - 12861
  • [27] An enhanced XOR-based scheme for wireless packet retransmission problem
    Gao, Zhenguo
    Xiang, Weidong
    Tan, Guozhen
    Yao, Nianmin
    Li, Peihua
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (12) : 3657 - 3675
  • [28] XOR-based frame loss recovery scheme for video streaming
    Chang, Ching-Lung
    Chang, Yue-Shan
    Chang, Ching-Hung
    Chen, Fang-Jie
    COMPUTER COMMUNICATIONS, 2011, 34 (10) : 1195 - 1201
  • [29] TAR-CAU: An XOR-Based Data Update Scheme
    Xiao Y.
    Zhou S.
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2023, 52 (05): : 773 - 779
  • [30] Modeling efficient XOR-based hash functions for cache memories
    Cho, Sung-Jin
    Choi, Un-Sook
    Hwang, Yoon-Hee
    Kim, Han-Doo
    COMPUTATIONAL SCIENCE - ICCS 2006, PT 1, PROCEEDINGS, 2006, 3991 : 1067 - 1070