Advanced Search
Volume 31 Issue 4
Dec.  2010
Turn off MathJax
Article Contents
Yu Bin, Xu Xiao-hui, Fang Li-guo. A Cheater Detectable VCS Based on Cumulative Array[J]. Journal of Electronics & Information Technology, 2009, 31(4): 950-953. doi: 10.3724/SP.J.1146.2007.01990
Citation: Yu Bin, Xu Xiao-hui, Fang Li-guo. A Cheater Detectable VCS Based on Cumulative Array[J]. Journal of Electronics & Information Technology, 2009, 31(4): 950-953. doi: 10.3724/SP.J.1146.2007.01990

A Cheater Detectable VCS Based on Cumulative Array

doi: 10.3724/SP.J.1146.2007.01990
  • Received Date: 2007-12-28
  • Rev Recd Date: 2008-05-11
  • Publish Date: 2009-04-19
  • A cheater detectable Visual Cryptography Scheme(VCS) based on cumulative array which can find the cheater without extra information and does not show any information of the secret image is introduced in this paper. Compared to previous schemes, it is more convenient and can find more cheaters.
  • loading
  • Shamir A. How to share a secret. Communications of theACM, 1979, 22(11): 612-613.[2]Blakley G R. Safeguarding cryptographic keys [C].Proceedings of the National Computer Conference, 1979, 48:242-268.[3]Naor M and Shamir A. Visual cryptography[J].Advances inCryptology-Eurocrypt94, Lecture Notes in ComputerScience.1995, Vol.950:1-12[4]颜浩, 甘志, 陈克非.可防欺骗的可视密码分享方案[J]. 上海交通大学学报, 2004, 38(1): 107-110.Yan Hao, Gan Zhi, and Chen Ke-fei. A cheater detectablevisual cryptography scheme [J]. Journal of Shanghai JiaotongUniversity, 2004, 38(1): 107-110.[5]郭洁, 颜浩, 刘妍, 陈克非. 一种可防止欺骗的可视密码分享方案[J]. 计算机工程, 2005, 31(6): 126-128.Guo Jie, Yan Hao, Liu Yan, and Chen Ke-fei. A cheaterdetectable visual cryptography scheme [J]. ComputerEngineering, 2005, 31(6): 126-128.[6]徐晓辉, 郁滨. 无重影的可防欺骗视觉密码方案[C]. 计算机技术与应用进展(CACIS.2007)2007: 1335-1339.Xu Xiao-hui and Yu Bin. A Cheater Detectable VCS withoutFringes [C]. Progress of Computer Technology andApplication in 2007 (CACIS.2007) 2007: 1335-1339.[7]Yu Bin, Xu Xiao-hui, and Fang Li-guo. Multi-secret sharingthreshold visual cryptography [C]. CIS Workshops 2007,Harbin, 2007: 815-818.[8]Ateniese G, Blundo C, De Santis A, and Stinson D R. Visualcryptography for general access structures[J].Information andComputation.1996, 129:86-106[9]Ateniese G, Blundo C, De Santis A, and Stinson D R.Extended capabilities for visual cryptography. TheoreticalComputer Science, 2001, 250: 143-161.[10]郁滨, 房礼国. 外形比例不失真的可视门限方案的研究[J]. 计算机工程与设计, 2006, 27(11): 1998-1999, 2014.Yu Bin and Fang Li-guo. Research on aspect ratio invariantvisual threshold scheme [J]. Computer Engineering andDesign, 2006, 27(11): 1998-1999, 2014.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3006) PDF downloads(745) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return