Advanced Search
Volume 33 Issue 1
Feb.  2011
Turn off MathJax
Article Contents
Yu Bin, Lu Jin-Yuan, Fang Li-Guo. Verifiable Visual Cryptography Based on Iterative Algorithm[J]. Journal of Electronics & Information Technology, 2011, 33(1): 163-167. doi: 10.3724/SP.J.1146.2010.00270
Citation: Yu Bin, Lu Jin-Yuan, Fang Li-Guo. Verifiable Visual Cryptography Based on Iterative Algorithm[J]. Journal of Electronics & Information Technology, 2011, 33(1): 163-167. doi: 10.3724/SP.J.1146.2010.00270

Verifiable Visual Cryptography Based on Iterative Algorithm

doi: 10.3724/SP.J.1146.2010.00270
  • Received Date: 2010-03-23
  • Rev Recd Date: 2010-08-25
  • Publish Date: 2011-01-19
  • By changing sharing and recovering ways of the verification image, a verifiable Visual Cryptography Scheme (VCS) based on iterative algorithm is proposed in this paper. Since the verification image is shared with special algorithms, and the verification process is optimized through iterative algorithm, the proposed scheme not only makes the pixel expansion much smaller, but also improves the checking efficiency greatly. Furthermore, verification images are perfectly recovered by the XOR operation introduced.
  • loading
  • Shamir A. How to share a secret[J].Communications of the ACM.1979, 22(11):612-613[2]Blakley G R. Safeguarding cryptographic keys[C]. Proceedings of the National Computer Conference, NJ, USA, 1979, 48: 242-268.[3]Naor M and Shamir A. Visual cryptography[C][J].Advances in Cryptology-Eurocrypt94, Lecture Notes in Computer Science.1995, 950:1-12[4]Ateniese G, Carlo B, and Santis A D, et al.. Visual cryptography for general access structures[J].Information and Computation.1996, 129(2):86-106[5]Steve L, Daniel M, and Rafail O. Visual Cryptography on Graphs[C]. COCOON 2008, LNCS 5092: 225-234.[6]Boundo C, Santis A D, and Stinson D R. On the contrast in visual cryptography schemes[J]. Journal of Cryptography, 1999, 12(4): 261-289.[7]Fang Li-guo and Yu Bin. Research on pixel expansion of (2, n) visual threshold scheme[C]. 1st International Symposium on Pervasive Computing and Applications Proceedings (SPCA06), Ningbo, 2006: 856-860.[8]Lin Sen-jen, Lin Ja-chen, and Fang Wen-pinn. Visual Cryptography (VC) with non-expanded shadow images Hilbert-curve approach[C]. ISI2008, Taipei, 2008: 271-272.[9]Cimato S, De Prisco R, and De Santis A. Optimal colored threshold visual cryptography schemes[J].Designs, Codes and Cryptography.2005, 35(3):311-335[10]Yang Ching-nung and Chen Tse-shih. Colored visual cryptography scheme based on additive color mixing[J].Pattern Recognition.2008, 41(10):3114-3129[11]Ng F Y and Wong D S. On the security of a visual cryptography scheme for color images[J].Pattern Recognition.2009, 42(5):929-940[12]Wu H C and Chang C C. Sharing visual multi-secrets using circle shares[J].Computer Standards Interfaces.2005, 134(28):123-135[13]Yu B, Fu Z X, and Fang L G. A modified multi-secret sharing visual cryptography scheme[C]. CIS2008, Suzhou, 2008: 351-354.[14]Fu Z X and Yu B. Research on rotation visual cryptography scheme[C]. International symposium on information engineering and electronic commerce, IEEE, Ternopil, Ukraine, 2009: 533-536.[15]陈玲慧. 视觉化密码之研究及其应用. 中国台湾专题研究计划成果报告, 计划编号:NSC 89-2213-E-009-016, 1999.[16]Chen Ling-hui. A study on visual cryptography and its applications. NSC 89-2213-E-009-016, 1999.[17]郭洁,颜浩,刘妍,陈克非.一种可防止欺骗的可视密码分享方案[J]. 计算机工程,2005, 31(6): 126-128.Guo Jie, Yan Hao, Liu Yan, and Chen Ke-fei. A cheater detectable visual cryptography scheme[J]. Computer Engineering, 2005, 31(6): 126-128.[18]徐晓辉,郁滨. 无重影的可防欺骗视觉密码方案[C].全国第18届计算机技术与应用学术会议(CACIS2007), 宁波, 2007: 1335-1339.[19]Xu Xiao-hui and Yu Bin. A cheater detectable VCS without fringes[C]. CACIS2007, Ningbo, 2007: 1335-1339.[20]Gwoboa H, Tzungher C, and Dushiau T. Cheating in visual cryptography[J].Designs, Codes and Cryptography.2006, 38(2):219-236[21]王益伟,郁滨. 一种(k', k, n)可防欺骗视觉密码方案[C]. 全国第19届计算机技术与应用学术会议(CACIS08), 合肥, 2008: 492-496.[22]Wang Yi-wei and Yu Bin. A (k',k,n)-cheater prevention VCS[C], CACIS08, Hefei, 2008: 492-496.Yu B, Fang L G, and Xu X H. A Verifiable visual cryptography scheme[C]. CIS2008, Suzhou, 2008: 347-350.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3397) PDF downloads(862) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return