Comment on "Cheating prevention in visual cryptography"

Visual cryptography (VC), proposed by Naor and Shamir, has numerous applications, including visual authentication and identification, steganography, and image encryption. In 2006, Horng showed that cheating is possible in VC, where some participants can deceive the remaining participants by forged...

Ausführliche Beschreibung

Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on image processing : a publication of the IEEE Signal Processing Society. - 1992. - 21(2012), 7 vom: 11. Juli, Seite 3319-23
1. Verfasser: Chen, Yu-Chi (VerfasserIn)
Weitere Verfasser: Horng, Gwoboa, Tsai, Du-Shiau
Format: Online-Aufsatz
Sprache:English
Veröffentlicht: 2012
Zugriff auf das übergeordnete Werk:IEEE transactions on image processing : a publication of the IEEE Signal Processing Society
Schlagworte:Letter Research Support, Non-U.S. Gov't Comment
Beschreibung
Zusammenfassung:Visual cryptography (VC), proposed by Naor and Shamir, has numerous applications, including visual authentication and identification, steganography, and image encryption. In 2006, Horng showed that cheating is possible in VC, where some participants can deceive the remaining participants by forged transparencies. Since then, designing cheating-prevention visual secret-sharing (CPVSS) schemes has been studied by many researchers. In this paper, we cryptanalyze the Hu-Tzeng CPVSS scheme and show that it is not cheating immune. We also outline an improvement that helps to overcome the problem
Beschreibung:Date Completed 15.10.2012
Date Revised 01.12.2018
published: Print-Electronic
CommentOn: IEEE Trans Image Process. 2007 Jan;16(1):36-45. - PMID 17283763
Citation Status MEDLINE
ISSN:1941-0042
DOI:10.1109/TIP.2012.2190082