How to share a secret with cheaters
Journal of Cryptology
Efficient dispersal of information for security, load balancing, and fault tolerance
Journal of the ACM (JACM)
The detection of cheaters in threshold schemes
SIAM Journal on Discrete Mathematics
A perfect threshold secret sharing scheme to identify cheaters
Designs, Codes and Cryptography
Communications of the ACM
Pattern Recognition Letters
Visual Authentication and Identification
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Optimum secret sharing scheme secure against cheating
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Preventing Cheating in Computational Visual Cryptography
Fundamenta Informaticae
Sharing a verifiable secret image using two shadows
Pattern Recognition
Self-verifying visual secret sharing using error diffusion and interpolation techniques
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
A comprehensive study of visual cryptography
Transactions on data hiding and multimedia security V
A verifiable secret sharing scheme based on AMBTC
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication
Random grid-based visual secret sharing for general access structures with cheat-preventing ability
Journal of Systems and Software
Cheating immune (2, n)-threshold visual secret sharing
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
Improvements of a two-in-one image secret sharing scheme based on gray mixing model
Journal of Visual Communication and Image Representation
On the equivalence of two definitions of visual cryptography scheme
ISPEC'12 Proceedings of the 8th international conference on Information Security Practice and Experience
Preventing Cheating in Computational Visual Cryptography
Fundamenta Informaticae
Authenticating visual cryptography shares using 2d barcodes
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
(Student contribution) ASPS: an authentication scheme using pre-formed visual cryptographic shares
Proceedings of the Fifth International Conference on Security of Information and Networks
A new authentication based cheating prevention scheme in Naor-Shamir's visual cryptography
Journal of Visual Communication and Image Representation
Threshold visual secret sharing by random grids with improved contrast
Journal of Systems and Software
Visual secret sharing with cheating prevention revisited
Digital Signal Processing
Improved tagged visual cryptography by random grids
Signal Processing
Hi-index | 0.00 |
A secret sharing scheme allows a secret to be shared among a set of participants, P, such that only authorized subsets of P can recover the secret, but any unauthorized subset cannot recover the secret. In 1995, Naor and Shamir proposed a variant of secret sharing, called visual cryptography, where the shares given to participants are xeroxed onto transparencies. If X is an authorized subset of P, then the participants in X can visually recover the secret image by stacking their transparencies together without performing any computation. In this paper, we address the issue of cheating by dishonest participants, called cheaters, in visual cryptography. The experimental results demonstrate that cheating is possible when the cheaters form a coalition in order to deceive honest participants. We also propose two simple cheating prevention visual cryptographic schemes.