A perfect threshold secret sharing scheme to identify cheaters
Designs, Codes and Cryptography
Visual cryptography for general access structures
Information and Computation
Communications of the ACM
Visual cryptography for grey level images
Information Processing Letters
Pattern Recognition Letters
Contrast Optimal Threshold Visual Cryptography Schemes
SIAM Journal on Discrete Mathematics
Visual cryptography for gray-level images by dithering techniques
Pattern Recognition Letters
Visual Authentication and Identification
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Visual Cryptography II: Improving the Contrast Via the Cover Base
Proceedings of the International Workshop on Security Protocols
Cheating in Visual Cryptography
Designs, Codes and Cryptography
A Matrix-Based Secret Sharing Scheme for Images
CIARP '08 Proceedings of the 13th Iberoamerican congress on Pattern Recognition: Progress in Pattern Recognition, Image Analysis and Applications
Preventing Cheating in Computational Visual Cryptography
Fundamenta Informaticae
Sharing a verifiable secret image using two shadows
Pattern Recognition
A secret sharing scheme for digital images based on two-dimensional linear cellular automata
IWCIA'08 Proceedings of the 12th international conference on Combinatorial image analysis
Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability
Image and Vision Computing
Comments on matrix-based secret sharing scheme for images
CIARP'10 Proceedings of the 15th Iberoamerican congress conference on Progress in pattern recognition, image analysis, computer vision, and applications
Secret image sharing with authentication-chaining and dynamic embedding
Journal of Systems and Software
Random grid-based visual secret sharing for general access structures with cheat-preventing ability
Journal of Systems and Software
Robust approaches to 3d object secret sharing
ICIAR'10 Proceedings of the 7th international conference on Image Analysis and Recognition - Volume Part I
A (2, 2) secret sharing scheme based on hamming code and AMBTC
ACIIDS'12 Proceedings of the 4th Asian conference on Intelligent Information and Database Systems - Volume Part II
On the equivalence of two definitions of visual cryptography scheme
ISPEC'12 Proceedings of the 8th international conference on Information Security Practice and Experience
Preventing Cheating in Computational Visual Cryptography
Fundamenta Informaticae
Authenticating visual cryptography shares using 2d barcodes
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
A new authentication based cheating prevention scheme in Naor-Shamir's visual cryptography
Journal of Visual Communication and Image Representation
Natural language letter based visual cryptography scheme
Journal of Visual Communication and Image Representation
Visual secret sharing with cheating prevention revisited
Digital Signal Processing
Region-in-Region incrementing visual cryptography scheme
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Aspect ratio invariant visual cryptography by image filtering and resizing
Personal and Ubiquitous Computing
Improved tagged visual cryptography by random grids
Signal Processing
A secret sharing scheme for EBTC using steganography
Journal of Intelligent Manufacturing
Hi-index | 0.01 |
In 1995, Naor and Shamir proposed the k-out-of-n visual cryptography scheme such that only more than or equal to k participants can visually recover the secret through superimposing their transparencies. Visual cryptography schemes have been extensively investigated since their invention and extended to numerous applications such as visual authentication and identification, steganography, and image encryption. In 2006, Horng et al. proposed that cheating is possible where some participants can deceive the remaining participants by delivering forged transparencies. Meanwhile, Horng et al. also proposed two cheating prevention schemes. One scheme, however, requires extra verification transparencies and the other needs larger transparencies. In other words, compared to visual cryptography, both schemes burden each participant with an additional problem of transparency management. In this paper, a more secure scheme is given to solve the cheating problem without extra burdens by adopting multiple distinct secret images. Moreover, for sharing these secret images simultaneously, the share construction method of visual cryptography is redesigned and extended by generic algorithms. Finally, the results of the experiment and security analysis show that not only the proposed scheme is more secure in comparison with the two previous cheating prevention schemes in the literature, but extra burdens are also eliminated.