A cheating prevention EVC scheme using watermarking techniques
Visual Cryptography (VC), proposed by Naor and Shamir in 1994, is a variation of the conventional secret sharing scheme. In VC, instead of a numerical secret key, a secret image is shared among participants in the form of images called shares. Each participant possesses his own share which cannot r...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Universidad de Antioquia
2012-08-01
|
Series: | Revista Facultad de Ingeniería Universidad de Antioquia |
Subjects: | |
Online Access: | https://revistas.udea.edu.co/index.php/ingenieria/article/view/12484 |
_version_ | 1797861607117684736 |
---|---|
author | Angelina Espejel Trujillo Mariko Nakano Miyatake Mitsugu Iwamoto Hector Perez Meana |
author_facet | Angelina Espejel Trujillo Mariko Nakano Miyatake Mitsugu Iwamoto Hector Perez Meana |
author_sort | Angelina Espejel Trujillo |
collection | DOAJ |
description |
Visual Cryptography (VC), proposed by Naor and Shamir in 1994, is a variation of the conventional secret sharing scheme. In VC, instead of a numerical secret key, a secret image is shared among participants in the form of images called shares. Each participant possesses his own share which cannot reveal the secret image being alone, making it necessary to stack more than one share of a qualified participant in order to reveal the secret image. Thus in VC the stacking of shares is equivalent to the decryption process, where neither extra computations nor previous knowledge are required to reveal the secret image. Until now some important VC schemes, such as the (k,n)-VC scheme, the general access structure for VC and the extended VC (EVC), have been proposed. Unfortunately all schemes can be cheated, if one or more participants try to generate their fake shares to force the revealed secret image to be a faked one. In this paper, we propose a cheating prevention VC scheme, in which the shares can be identified and authenticated using the EVC scheme and watermarking techniques. In the proposed VC scheme, the share of each participant can be identified by its meaningful appearance instead of noise-like image used in the conventional VC scheme. For the purpose of authentication of each share two binary watermark images are encrypted using shift operation. Before the secret image is revealed, the validation of the shares must be carried out, extracting two watermark images. If they can be extracted correctly, the revealed secret image is considered as authentic; otherwise it is determined as a faked one. The simulation results show the desirable performance of the proposed EVC scheme.
|
first_indexed | 2024-04-09T22:05:51Z |
format | Article |
id | doaj.art-31fc78d9fd9f498ab343d30de905169f |
institution | Directory Open Access Journal |
issn | 0120-6230 2422-2844 |
language | English |
last_indexed | 2024-04-09T22:05:51Z |
publishDate | 2012-08-01 |
publisher | Universidad de Antioquia |
record_format | Article |
series | Revista Facultad de Ingeniería Universidad de Antioquia |
spelling | doaj.art-31fc78d9fd9f498ab343d30de905169f2023-03-23T12:37:41ZengUniversidad de AntioquiaRevista Facultad de Ingeniería Universidad de Antioquia0120-62302422-28442012-08-016310.17533/udea.redin.12484A cheating prevention EVC scheme using watermarking techniquesAngelina Espejel Trujillo0Mariko Nakano Miyatake1Mitsugu Iwamoto2Hector Perez Meana3National Polytechnic Institute of MexicoNational Polytechnic Institute of MexicoThe University of Electro-CommunicationNational Polytechnic Institute of Mexico Visual Cryptography (VC), proposed by Naor and Shamir in 1994, is a variation of the conventional secret sharing scheme. In VC, instead of a numerical secret key, a secret image is shared among participants in the form of images called shares. Each participant possesses his own share which cannot reveal the secret image being alone, making it necessary to stack more than one share of a qualified participant in order to reveal the secret image. Thus in VC the stacking of shares is equivalent to the decryption process, where neither extra computations nor previous knowledge are required to reveal the secret image. Until now some important VC schemes, such as the (k,n)-VC scheme, the general access structure for VC and the extended VC (EVC), have been proposed. Unfortunately all schemes can be cheated, if one or more participants try to generate their fake shares to force the revealed secret image to be a faked one. In this paper, we propose a cheating prevention VC scheme, in which the shares can be identified and authenticated using the EVC scheme and watermarking techniques. In the proposed VC scheme, the share of each participant can be identified by its meaningful appearance instead of noise-like image used in the conventional VC scheme. For the purpose of authentication of each share two binary watermark images are encrypted using shift operation. Before the secret image is revealed, the validation of the shares must be carried out, extracting two watermark images. If they can be extracted correctly, the revealed secret image is considered as authentic; otherwise it is determined as a faked one. The simulation results show the desirable performance of the proposed EVC scheme. https://revistas.udea.edu.co/index.php/ingenieria/article/view/12484extended visual cryptography cheating preventionwatermarkingvisual cryptography |
spellingShingle | Angelina Espejel Trujillo Mariko Nakano Miyatake Mitsugu Iwamoto Hector Perez Meana A cheating prevention EVC scheme using watermarking techniques Revista Facultad de Ingeniería Universidad de Antioquia extended visual cryptography cheating prevention watermarking visual cryptography |
title | A cheating prevention EVC scheme using watermarking techniques |
title_full | A cheating prevention EVC scheme using watermarking techniques |
title_fullStr | A cheating prevention EVC scheme using watermarking techniques |
title_full_unstemmed | A cheating prevention EVC scheme using watermarking techniques |
title_short | A cheating prevention EVC scheme using watermarking techniques |
title_sort | cheating prevention evc scheme using watermarking techniques |
topic | extended visual cryptography cheating prevention watermarking visual cryptography |
url | https://revistas.udea.edu.co/index.php/ingenieria/article/view/12484 |
work_keys_str_mv | AT angelinaespejeltrujillo acheatingpreventionevcschemeusingwatermarkingtechniques AT marikonakanomiyatake acheatingpreventionevcschemeusingwatermarkingtechniques AT mitsuguiwamoto acheatingpreventionevcschemeusingwatermarkingtechniques AT hectorperezmeana acheatingpreventionevcschemeusingwatermarkingtechniques AT angelinaespejeltrujillo cheatingpreventionevcschemeusingwatermarkingtechniques AT marikonakanomiyatake cheatingpreventionevcschemeusingwatermarkingtechniques AT mitsuguiwamoto cheatingpreventionevcschemeusingwatermarkingtechniques AT hectorperezmeana cheatingpreventionevcschemeusingwatermarkingtechniques |