A cheating prevention EVC scheme using watermarking techniques

Visual Cryptography (VC), proposed by Naor and Shamir in 1994, is a variation of the conventional secret sharing scheme. In VC, instead of a numerical secret key, a secret image is shared among participants in the form of images called shares. Each participant possesses his own share which cannot r...

Full description

Bibliographic Details
Main Authors: Angelina Espejel Trujillo, Mariko Nakano Miyatake, Mitsugu Iwamoto, Hector Perez Meana
Format: Article
Language:English
Published: Universidad de Antioquia 2012-08-01
Series:Revista Facultad de Ingeniería Universidad de Antioquia
Subjects:
Online Access:https://revistas.udea.edu.co/index.php/ingenieria/article/view/12484
_version_ 1797861607117684736
author Angelina Espejel Trujillo
Mariko Nakano Miyatake
Mitsugu Iwamoto
Hector Perez Meana
author_facet Angelina Espejel Trujillo
Mariko Nakano Miyatake
Mitsugu Iwamoto
Hector Perez Meana
author_sort Angelina Espejel Trujillo
collection DOAJ
description Visual Cryptography (VC), proposed by Naor and Shamir in 1994, is a variation of the conventional secret sharing scheme. In VC, instead of a numerical secret key, a secret image is shared among participants in the form of images called shares. Each participant possesses his own share which cannot reveal the secret image being alone, making it necessary to stack more than one share of a qualified participant in order to reveal the secret image. Thus in VC the stacking of shares is equivalent to the decryption process, where neither extra computations nor previous knowledge are required to reveal the secret image. Until now some important VC schemes, such as the (k,n)-VC scheme, the general access structure for VC and the extended VC (EVC), have been proposed. Unfortunately all schemes can be cheated, if one or more participants try to generate their fake shares to force the revealed secret image to be a faked one. In this paper, we propose a cheating prevention VC scheme, in which the shares can be identified and authenticated using the EVC scheme and watermarking techniques. In the proposed VC scheme, the share of each participant can be identified by its meaningful appearance instead of noise-like image used in the conventional VC scheme. For the purpose of authentication of each share two binary watermark images are encrypted using shift operation. Before the secret image is revealed, the validation of the shares must be carried out, extracting two watermark images. If they can be extracted correctly, the revealed secret image is considered as authentic; otherwise it is determined as a faked one. The simulation results show the desirable performance of the proposed EVC scheme.
first_indexed 2024-04-09T22:05:51Z
format Article
id doaj.art-31fc78d9fd9f498ab343d30de905169f
institution Directory Open Access Journal
issn 0120-6230
2422-2844
language English
last_indexed 2024-04-09T22:05:51Z
publishDate 2012-08-01
publisher Universidad de Antioquia
record_format Article
series Revista Facultad de Ingeniería Universidad de Antioquia
spelling doaj.art-31fc78d9fd9f498ab343d30de905169f2023-03-23T12:37:41ZengUniversidad de AntioquiaRevista Facultad de Ingeniería Universidad de Antioquia0120-62302422-28442012-08-016310.17533/udea.redin.12484A cheating prevention EVC scheme using watermarking techniquesAngelina Espejel Trujillo0Mariko Nakano Miyatake1Mitsugu Iwamoto2Hector Perez Meana3National Polytechnic Institute of MexicoNational Polytechnic Institute of MexicoThe University of Electro-CommunicationNational Polytechnic Institute of Mexico Visual Cryptography (VC), proposed by Naor and Shamir in 1994, is a variation of the conventional secret sharing scheme. In VC, instead of a numerical secret key, a secret image is shared among participants in the form of images called shares. Each participant possesses his own share which cannot reveal the secret image being alone, making it necessary to stack more than one share of a qualified participant in order to reveal the secret image. Thus in VC the stacking of shares is equivalent to the decryption process, where neither extra computations nor previous knowledge are required to reveal the secret image. Until now some important VC schemes, such as the (k,n)-VC scheme, the general access structure for VC and the extended VC (EVC), have been proposed. Unfortunately all schemes can be cheated, if one or more participants try to generate their fake shares to force the revealed secret image to be a faked one. In this paper, we propose a cheating prevention VC scheme, in which the shares can be identified and authenticated using the EVC scheme and watermarking techniques. In the proposed VC scheme, the share of each participant can be identified by its meaningful appearance instead of noise-like image used in the conventional VC scheme. For the purpose of authentication of each share two binary watermark images are encrypted using shift operation. Before the secret image is revealed, the validation of the shares must be carried out, extracting two watermark images. If they can be extracted correctly, the revealed secret image is considered as authentic; otherwise it is determined as a faked one. The simulation results show the desirable performance of the proposed EVC scheme. https://revistas.udea.edu.co/index.php/ingenieria/article/view/12484extended visual cryptography cheating preventionwatermarkingvisual cryptography
spellingShingle Angelina Espejel Trujillo
Mariko Nakano Miyatake
Mitsugu Iwamoto
Hector Perez Meana
A cheating prevention EVC scheme using watermarking techniques
Revista Facultad de Ingeniería Universidad de Antioquia
extended visual cryptography
cheating prevention
watermarking
visual cryptography
title A cheating prevention EVC scheme using watermarking techniques
title_full A cheating prevention EVC scheme using watermarking techniques
title_fullStr A cheating prevention EVC scheme using watermarking techniques
title_full_unstemmed A cheating prevention EVC scheme using watermarking techniques
title_short A cheating prevention EVC scheme using watermarking techniques
title_sort cheating prevention evc scheme using watermarking techniques
topic extended visual cryptography
cheating prevention
watermarking
visual cryptography
url https://revistas.udea.edu.co/index.php/ingenieria/article/view/12484
work_keys_str_mv AT angelinaespejeltrujillo acheatingpreventionevcschemeusingwatermarkingtechniques
AT marikonakanomiyatake acheatingpreventionevcschemeusingwatermarkingtechniques
AT mitsuguiwamoto acheatingpreventionevcschemeusingwatermarkingtechniques
AT hectorperezmeana acheatingpreventionevcschemeusingwatermarkingtechniques
AT angelinaespejeltrujillo cheatingpreventionevcschemeusingwatermarkingtechniques
AT marikonakanomiyatake cheatingpreventionevcschemeusingwatermarkingtechniques
AT mitsuguiwamoto cheatingpreventionevcschemeusingwatermarkingtechniques
AT hectorperezmeana cheatingpreventionevcschemeusingwatermarkingtechniques