Communications of the ACM
Visual Authentication and Identification
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Sharing a Secret Two-Tone Image in Two Gray-Level Images
ICPADS '05 Proceedings of the 11th International Conference on Parallel and Distributed Systems - Workshops - Volume 02
Cheating in Visual Cryptography
Designs, Codes and Cryptography
Image encryption by random grids
Pattern Recognition
Image encryption by multiple random grids
Pattern Recognition
Visual secret sharing by random grids revisited
Pattern Recognition
A novel user-participating authentication scheme
Journal of Systems and Software
Efficient multi-secret image sharing based on Boolean operations
Signal Processing
Threshold visual secret sharing by random grids
Journal of Systems and Software
Cheating immune (2, n)-threshold visual secret sharing
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
Cheating Prevention in Visual Cryptography
IEEE Transactions on Image Processing
User-Friendly Random-Grid-Based Visual Secret Sharing
IEEE Transactions on Circuits and Systems for Video Technology
Random grid-based visual secret sharing for general access structures with cheat-preventing ability
Journal of Systems and Software
Improving the visual quality of random grid-based visual secret sharing
Signal Processing
Threshold visual secret sharing by random grids with improved contrast
Journal of Systems and Software
Improved tagged visual cryptography by random grids
Signal Processing
Hi-index | 0.08 |
Visual secret sharing (VSS), either visual-cryptography-based (VC-based) VSS or random-grid-based (RG-based) VSS, is a well-known technology of secret communication for sensitive security applications. Horng et al. (2006) kindled the interest in the cheating problem existing in threshold VC-based VSS. The cheating problem happened when dishonest participants collude to cheat honest ones by enabling the latter to accept the wrong secret information generated by the former. As RG-based VSS (RGVSS) has gained significant attention in academia in the past years, it is concerned that RG-based VSS may also suffer cheating attacks. The authors of the present study demonstrate that the security risk does exist in RG-based VSS. To prove the feasibility of cheating, the experimental results and formal analysis illustrate that the proposed collusion attacks do work.