A Verifiable Visual Cryptography Scheme

被引:0
|
作者
Yu, Bin
Fang, Liguo
Xu, Xiaohui
机构
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
To solve the problem of cheating in the reconstructing process of visual cryptography, a verifiable visual cryptography was proposed by adding a verifier to common visual cryptography, scheme(VCS). This scheme can be used in any access structure and can check every, share to prevent attackers from spoiling and grabbing the secret information.
引用
收藏
页码:908 / 911
页数:4
相关论文
共 50 条
  • [41] Optimal pixel expansion of deterministic visual cryptography scheme
    Fu, Zhengxin
    Yu, Bin
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 73 (03) : 1177 - 1193
  • [42] A Novel Copyright Protection Scheme Using Visual Cryptography
    Nag, Amitava
    Singh, Jyoti Prakash
    Biswas, Sushanta
    Sarkar, D.
    Sarkar, Partha Pratim
    [J]. ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 2, 2011, 191 : 612 - 619
  • [43] Natural language letter based visual cryptography scheme
    Lin, Hsiao-Ching
    Yang, Ching-Nung
    Laih, Chi-Sung
    Lin, Hui-Tang
    [J]. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2013, 24 (03) : 318 - 331
  • [44] Dynamic visual cryptography scheme on the surface of a vibrating structure
    Vaidelys, Martynas
    Aleksiene, Sandra
    Ragulskiene, Jurate
    [J]. JOURNAL OF VIBROENGINEERING, 2015, 17 (08) : 4142 - 4152
  • [45] Non-expanded Visual Cryptography Scheme with Authentication
    Huang, Yi-Jing
    Chang, Jun-Dong
    [J]. IEEE INTERNATIONAL SYMPOSIUM ON NEXT-GENERATION ELECTRONICS 2013 (ISNE 2013), 2013,
  • [46] Mammograms Multiple Watermarking Scheme Based on Visual Cryptography
    Benyoussef, Meryem
    Mabtoul, Samira
    El Marraki, Mohamed
    Aboutajdine, Driss
    [J]. PROCEEDINGS OF THE MEDITERRANEAN CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGIES 2015, VOL 1, 2016, 380 : 445 - 453
  • [47] Improved scheme and evaluation method for progressive visual cryptography
    Thai, Binh Le Thanh
    Tanaka, Hidema
    Watanabe, Kohtaro
    [J]. EURASIP JOURNAL ON INFORMATION SECURITY, 2022, 2022 (01)
  • [48] Secure QR Code Scheme Based on Visual Cryptography
    Cao, Xiaohe
    Feng, Liuping
    Cao, Peng
    Hu, Jianhua
    [J]. PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRIAL ENGINEERING (AIIE 2016), 2016, 133 : 433 - 436
  • [49] Collusive Attacks to Partition Authentication Visual Cryptography Scheme
    Ren, Yawei
    Liu, Feng
    Wang, Wen
    [J]. DIGITAL FORENSICS AND WATERMARKING, IWDW 2016, 2017, 10082 : 238 - 250
  • [50] An efficient XOR-based verifiable visual cryptographic scheme
    Xingxing Jia
    Daoshun Wang
    Qimeng Chu
    Zhenhua Chen
    [J]. Multimedia Tools and Applications, 2019, 78 : 8207 - 8223