skip to main content
survey

Improved Random Grid-based Cheating Prevention Visual Cryptography Using Latin Square

Authors Info & Claims
Published:15 March 2023Publication History
Skip Abstract Section

Abstract

Visual cryptography scheme is a method of encrypting secret image into n noiselike shares. The secret image can be reconstructed by stacking adequate shares. In the past two decades, many schemes have been proposed to realize the cheating prevention visual cryptography scheme (CPVCS). Significantly, Ren et al. [9] first introduced the idea of CPVCS with the help of Latin square. Inspired by their work, in this article, a new reliable scheme is proposed. More precisely, to facilitate the certification process, we embed meaningful characters into the randomly chosen authentication patterns in each divided blocks. Furthermore, we fix the security vulnerability in the stacked results of share Sg and verification Verg, where 1≤ gn. Since the improved scheme encrypts the secret image by utilizing random grids, the generated shares have no pixel expansion. Finally, theoretical analysis and experimental results are conducted to evaluate the efficiency and security of the proposed scheme.

REFERENCES

  1. [1] Chang C. C., Chen T., and Liu L. J.. 2009. Preventing cheating in computational visual cryptography. Fundam. Inf. 92, 1–2 (2009), 2742.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. [2] Chen T. and Tsao K.. 2011. Threshold visual secret sharing by random grids. J. Syst. Softw. 84, 7 (2011), 11971208.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. [3] Lin P. Y., Wang R. Z., Chang Y. J., and Fang W. P.. 2015. Prevention of cheating in visual cryptography by using coherent patterns. Inf. Sci. 301, (2015), 6174.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. [4] Liu F., Wu C. K. and Lin X. J.. 2011. Cheating immune visual cryptography scheme. IET Inf. Secur. 5, 1 (2011), 5159.Google ScholarGoogle ScholarCross RefCross Ref
  5. [5] Horng G., Chen T., and Tsai D. S.. 2006. Cheating in visual cryptography. Des. Codes Cryptogr. 38, 2 (2006), 219236.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. [6] Hu H., Shen G., Fu Z. X., and Yu B.. 2018. Improved contrast for threshold random-grid-based visual cryptography. KSII Trans. Internet Inf. Syst. 12, 7 (2018), 34013420.Google ScholarGoogle Scholar
  7. [7] Hu C. M. and Tzeng W. G.. 2007. Cheating prevention in visual cryptography. IEEE Trans. Image Process. 16, 1 (2007), 3645.Google ScholarGoogle ScholarCross RefCross Ref
  8. [8] Naor M. and Shamir A.. 1994. Visual cryptography. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT’94), Lecture Notes in Computer Science, Vol. 950. 112.Google ScholarGoogle Scholar
  9. [9] Ren Y. W., Liu F., Guo T., Feng R. Q., and Lin D. D.. 2017. Cheating prevention visual cryptography scheme using latin square. IET Inf. Secur. 11, 4 (2017), 211219.Google ScholarGoogle ScholarCross RefCross Ref
  10. [10] Shyu S. J.. 2009. Image encryption by multiple random grids. Pattern Recogn. 40, 3 (2009), 10141031.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. [11] Tsai D. S., Chen T., and Horng G.. 2007. A cheating prevention scheme for binary visual cryptography with homogeneous secret images. Pattern Recogn. 40, 8 (2007), 23562366.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. [12] Kafri O. and Keren E.. 1987. Encryption of pictures and shapes by random grids. Opt. Lett. 12, 6 (1987), 377379.Google ScholarGoogle ScholarCross RefCross Ref
  13. [13] Yan X. H. and Lu Y. L.. 2017. Contrast-improved visual secret sharing based on random grid for general access structure. Digit. Sign. Process. 71, (2017), 3645.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. [14] Yang C. N., Lin Y. C., and Li P.. 2020. Cheating immune k-out-of-n block-based progressive visual cryptography. J. Inf. Secur. Appl. 55 (2020), 102660.Google ScholarGoogle Scholar
  15. [15] Yan X. H., Liu X., and Yang C. N.. 2018. An enhanced threshold visual secret sharing based on random grids. J. Real-Time Image Process. 14, 1 (2018), 6173.Google ScholarGoogle ScholarCross RefCross Ref
  16. [16] Yadav M.. 2020. Ranvijay: Cheating prevention and detection technique in visual secret sharing. Ingén. Syst. d’Inf. 25, 4 (2020), 453460.Google ScholarGoogle Scholar
  17. [17] Yang C. N., Wu C. C., and Wang D. S.. 2014. A discussion on the relationship between probabilistic visual cryptography and random grid. Inf. Sci. 278 (2014), 141173.Google ScholarGoogle ScholarCross RefCross Ref
  18. [18] Zhao Y. K. and Fu F.-W.. 2022. A contrast improved or and xor based \((k,n)\) visual cryptography scheme without pixel expansion. J. Vis. Commun. Image Represent. 82 (2022), 103408.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. [19] Zhao Y. K. and Fu F.-W.. 2022. A cheating immune \((k,n)\) visual cryptography scheme by using the rotation of shares. Multimedia Tools Appl. 81, 5 (2022), 62356257.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Improved Random Grid-based Cheating Prevention Visual Cryptography Using Latin Square

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Multimedia Computing, Communications, and Applications
      ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 19, Issue 2s
      April 2023
      545 pages
      ISSN:1551-6857
      EISSN:1551-6865
      DOI:10.1145/3572861
      • Editor:
      • Abdulmotaleb El Saddik
      Issue’s Table of Contents

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 15 March 2023
      • Online AM: 3 August 2022
      • Accepted: 5 July 2022
      • Revised: 8 April 2022
      • Received: 24 September 2021
      Published in tomm Volume 19, Issue 2s

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • survey
    • Article Metrics

      • Downloads (Last 12 months)118
      • Downloads (Last 6 weeks)8

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    View Full Text

    HTML Format

    View this article in HTML Format .

    View HTML Format
    About Cookies On This Site

    We use cookies to ensure that we give you the best experience on our website.

    Learn more

    Got it!