Cryptography Reference
In-Depth Information
TABLE 10.1
Comparisons of different cheating prevention visual secret sharing schemes.
Scheme Approach
Access stru.
Share gen.
subpixels
Security
Base matrices 2n 2
HCL1
Share auth. General
Base matrices 2(n + 1) 2
HCL2
Blind auth. k-out-of-n
Secure
HT
Share auth. k-out-of-n
Base matrices 2n(n + 2)
n 2
TCH
Blind auth. 2-out-of-n
GA
Blind auth. 2(n)-out-of-n Base matrices 2(n + 1) 2
PS1
Secure
Base matrices n (2 n + n + 1) Secure
PS2
Blind auth. 2-out-of-n
10.5 Conclusions
In this chapter, we have surveyed some cheating prevention schemes in visual
cryptography and provided a comparative evaluation of their advantages and
disadvantages. There are many topics that deserve further instigation, for
example, giving formal definition of cheating and cheating attack models and
designing new cheating prevention scheme a with less numbers of subpixels
for sharing a pixel.
Bibliography
[1] A. Shamir and M. Naor. Visual cryptography II: Improving the contrast
via the cover base, security in communication networks, September 16{
17, 1996.
[2] C. Blundo, A. De Santis, and M. Naor. Visual cryptography for grey level
images. Information Processing Letters, Vol. 75, No. 6, (2000) 255{259.
[3] C. Blundo, P. D'Arco, A. De Santis, D. R. Stinson. Contrast optimal
threshold visual cryptography schemes, SIAM J. Discrete Math. 16(2)
(2003) 224{261.
[4] C.C. Chang, and J.C. Chuang. An image intellectual property protection
scheme for gray-level image using visual secret sharing strategy, Pattern
Recognition Letters, Vol. 23 (2002) 931{941.
[5] C.C. Lin, W.H. Tsai. Visual cryptography for gray-level images by dither-
ing techniques, Pattern Recognition Letters. Vol. 24 (1{3) (2003) 349{358.
 
 
Search WWH ::




Custom Search