Comment on "Cheating prevention in visual cryptography"

Visual cryptography (VC), proposed by Naor and Shamir, has numerous applications, including visual authentication and identification, steganography, and image encryption. In 2006, Horng showed that cheating is possible in VC, where some participants can deceive the remaining participants by forged...

Ausführliche Beschreibung

Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on image processing : a publication of the IEEE Signal Processing Society. - 1992. - 21(2012), 7 vom: 11. Juli, Seite 3319-23
1. Verfasser: Chen, Yu-Chi (VerfasserIn)
Weitere Verfasser: Horng, Gwoboa, Tsai, Du-Shiau
Format: Online-Aufsatz
Sprache:English
Veröffentlicht: 2012
Zugriff auf das übergeordnete Werk:IEEE transactions on image processing : a publication of the IEEE Signal Processing Society
Schlagworte:Letter Research Support, Non-U.S. Gov't Comment
LEADER 01000naa a22002652 4500
001 NLM216130069
003 DE-627
005 20231224031042.0
007 cr uuu---uuuuu
008 231224s2012 xx |||||o 00| ||eng c
024 7 |a 10.1109/TIP.2012.2190082  |2 doi 
028 5 2 |a pubmed24n0720.xml 
035 |a (DE-627)NLM216130069 
035 |a (NLM)22410333 
040 |a DE-627  |b ger  |c DE-627  |e rakwb 
041 |a eng 
100 1 |a Chen, Yu-Chi  |e verfasserin  |4 aut 
245 1 0 |a Comment on "Cheating prevention in visual cryptography" 
264 1 |c 2012 
336 |a Text  |b txt  |2 rdacontent 
337 |a ƒaComputermedien  |b c  |2 rdamedia 
338 |a ƒa Online-Ressource  |b cr  |2 rdacarrier 
500 |a Date Completed 15.10.2012 
500 |a Date Revised 01.12.2018 
500 |a published: Print-Electronic 
500 |a CommentOn: IEEE Trans Image Process. 2007 Jan;16(1):36-45. - PMID 17283763 
500 |a Citation Status MEDLINE 
520 |a Visual cryptography (VC), proposed by Naor and Shamir, has numerous applications, including visual authentication and identification, steganography, and image encryption. In 2006, Horng showed that cheating is possible in VC, where some participants can deceive the remaining participants by forged transparencies. Since then, designing cheating-prevention visual secret-sharing (CPVSS) schemes has been studied by many researchers. In this paper, we cryptanalyze the Hu-Tzeng CPVSS scheme and show that it is not cheating immune. We also outline an improvement that helps to overcome the problem 
650 4 |a Letter 
650 4 |a Research Support, Non-U.S. Gov't 
650 4 |a Comment 
700 1 |a Horng, Gwoboa  |e verfasserin  |4 aut 
700 1 |a Tsai, Du-Shiau  |e verfasserin  |4 aut 
773 0 8 |i Enthalten in  |t IEEE transactions on image processing : a publication of the IEEE Signal Processing Society  |d 1992  |g 21(2012), 7 vom: 11. Juli, Seite 3319-23  |w (DE-627)NLM09821456X  |x 1941-0042  |7 nnns 
773 1 8 |g volume:21  |g year:2012  |g number:7  |g day:11  |g month:07  |g pages:3319-23 
856 4 0 |u http://dx.doi.org/10.1109/TIP.2012.2190082  |3 Volltext 
912 |a GBV_USEFLAG_A 
912 |a SYSFLAG_A 
912 |a GBV_NLM 
912 |a GBV_ILN_350 
951 |a AR 
952 |d 21  |j 2012  |e 7  |b 11  |c 07  |h 3319-23