Content based authentication of visual cryptography

被引:0
|
作者
G. Wang
W. Yan
M. Kankanhalli
机构
[1] Auckland University of Technology,
[2] National University of Singapore,undefined
来源
关键词
Visual cryptography; Secret sharing; Digital image processing;
D O I
暂无
中图分类号
学科分类号
摘要
Visual Cryptography (VC) has been developed as a significant research arena in media security. Despite of its obvious strengths, recent investigations have debated this scheme from adverse aspects, its problem is lack of authentication of VC shares, VC authentication related to digital image processing and cryptography has not been fully integrated together in the past years. In this paper, we analyze both visual features and cryptographic features of VC shares and take use of them for VC authentication. Compared to those existing methods, our contribution is the first one to integrate visual features and cryptographic features of VC shares into Hash code for the purpose of VC authentication.
引用
收藏
页码:9427 / 9441
页数:14
相关论文
共 50 条
  • [1] Content based authentication of visual cryptography
    Wang, G.
    Yan, W.
    Kankanhalli, M.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (07) : 9427 - 9441
  • [2] Zero-Knowledge Authentication Based on Visual Cryptography
    Han, Yan-Yan
    Zhang, Yao
    He, Wen-Cai
    Xu, Zhuo-Lin
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 406 - 411
  • [3] Watermarking-based transparency authentication in visual cryptography
    Luo, Hao
    Pan, Jeng-Shyang
    Lu, Zhe-Ming
    Liao, Bin-Yih
    [J]. PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, 2007, : 609 - +
  • [4] Chaotic Visual Cryptography Based Digitized Document Authentication
    Anirban Goswami
    Ritesh Mukherjee
    Nabin Ghoshal
    [J]. Wireless Personal Communications, 2017, 96 : 3585 - 3605
  • [5] Chaotic Visual Cryptography Based Digitized Document Authentication
    Goswami, Anirban
    Mukherjee, Ritesh
    Ghoshal, Nabin
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (03) : 3585 - 3605
  • [6] An Image Based Authentication Technique Using Visual Cryptography Scheme
    Dais, Annie, V
    Joe, Vijesh C.
    Sugi, Sidney Swarna S.
    [J]. PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2017), 2017, : 124 - 129
  • [7] Remote Optical Information Authentication System Based on Visual Cryptography
    Tao Ye
    Zhu Yupeng
    Yang Dongyu
    Lu Wenjin
    Shi Yishi
    [J]. ACTA OPTICA SINICA, 2021, 41 (16)
  • [8] Speckle visual cryptography for credential authentication
    Jiao, Anqing
    Zhu, Yupeng
    Mi, Zhaoke
    Zhou, Xinlong
    Zhu, Qiaofen
    Ke, Changjun
    Shi, Yishi
    [J]. APPLIED OPTICS, 2024, 63 (16) : 4351 - 4359
  • [9] Developing Visual Cryptography for Authentication on Smartphones
    Yang, Ching-Nung
    Liao, Jung-Kuo
    Wu, Fu-Heng
    Yamaguchi, Yasushi
    [J]. INDUSTRIAL IOT TECHNOLOGIES AND APPLICATIONS, INDUSTRIAL IOT 2016, 2016, 173
  • [10] User Authentication using Visual Cryptography
    Kumar, Praveen P.
    Sabitha, S.
    [J]. 2015 INTERNATIONAL CONFERENCE ON CONTROL COMMUNICATION & COMPUTING INDIA (ICCC), 2015, : 647 - 652