ICICS '97 Proceedings of the First International Conference on Information and Communication Security
Visual Authentication and Identification
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
XOR-based Visual Cryptography Schemes
Designs, Codes and Cryptography
Cheating in Visual Cryptography
Designs, Codes and Cryptography
A New Credit Card Payment Scheme Using Mobile Phones Based on Visual Cryptography
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
ICCGI '08 Proceedings of the 2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008)
Preventing Cheating in Computational Visual Cryptography
Fundamenta Informaticae
Dot-Size Variant Visual Cryptography
IWDW '09 Proceedings of the 8th International Workshop on Digital Watermarking
Image Hatching for Visual Cryptography
IMVIP '09 Proceedings of the 2009 13th International Machine Vision and Image Processing Conference
Cheating Immune Threshold Visual Secret Sharing1
The Computer Journal
Cheating Prevention in Visual Cryptography
IEEE Transactions on Image Processing
Hi-index | 0.00 |
One of the problems pertinent with many visual cryptography (VC) schemes is that of authentication. VC provides a way of sharing secrets between a number of participants. The secrets are in the form of an image that is encoded into multiple pieces known as shares. When these shares are physically superimposed, the secret can be instantly observed. A known problem is that of authentication. How is it possible to know that the secret being recovered is genuine? There has been some work devoted to this using so called cheating prevention schemes which attempt to provide a means of traceability or authentication via a set of additional shares that are used to check authenticity. This paper proposes a scheme that attempts to alleviate this suspicion by using 2D barcodes as a means of authentication which may have more practicality in terms of real world usage. Results are provided using an application that is available on mobile devices for portable barcode reading.