scispace - formally typeset
Open AccessJournal ArticleDOI

A Novel Approach for Cheating Prevention through Visual Cryptographic Analysis

Reads0
Chats0
TLDR
An overview of the emerging Visual Cryptography (VC) and related security research work done in this area is provided to solve the cheating problem without extra burdens by adopting multiple distinct secret images.
Abstract
Confidentiality is probably the most common aspect of information security and we need to protect our valuable information and it has become an inseparable issue as information technology is ruling the world now. Cryptography is the study of integer mathematical techniques related aspects of Information Security such as confidentiality, data security, entity authentication and data origin authentication but it is not the only means of providing information security, rather one of the techniques. In this paper, a more secure scheme is given to solve the cheating problem without extra burdens by adopting multiple distinct secret images. Moreover, for sharing these secret images simultaneously, the share construction method of visual cryptography is redesigned and extended by generic algorithms. Visual cryptography is a new technique which provides information security which uses simple algorithm unlike the complex, computationally intensive algorithms used in other techniques like traditional cryptography. This technique allows Visual information (pictures, text, etc) to be encrypted in such a way that their decryption can be performed by the human visual system, without any complex cryptographic algorithms. This technique encrypts a secret image into shares such that stacking a sufficient number of shares reveals the secret image. Shares are usually presented in transparencies. In this paper we provide an overview of the emerging Visual Cryptography (VC) and related security research work done in this area.

read more

Citations
More filters
Proceedings ArticleDOI

Secure transmission of medical information using IRIS recognition and steganography

TL;DR: The proposed authentication methods can be used for recording the medical data in a central database and for accessing medical records in various settings and an algorithm for visual cryptography and steganography is built using MATLAB platform.

New Capabilities of Visual Cryptography

TL;DR: This paper presents a strategy by which more than one SI can be shared simultaneously among the n users using exactly the same shares required for the existing (k, n)-VCS without any extra pixel expansions or any other type of overheads over thatrequired for the already existing schemes.
Journal ArticleDOI

Security Concern and Countermeasures for Cheating in Visual Cryptography

TL;DR: The basis of cheating in VC is shown in terms of cheating process, its detection methods and its prevention methods suggested by various researchers along with their merits and demerits.
References
More filters
Journal ArticleDOI

How to share a secret

TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.

Visual Cryptography

Moni Naor, +1 more
TL;DR: In this paper, a new type of cryptographic scheme, which can decode concealed images without any cryptographic computations, is proposed, which is called k-out-of-n secret sharing.
Journal ArticleDOI

New visual secret sharing schemes using probabilistic method

TL;DR: The frequency of white pixels is used to show the contrast of the recovered image and the scheme is nonexpansible and can be easily implemented on a basis of conventional VSS scheme.
Journal ArticleDOI

How to share a secret with cheaters

TL;DR: This paper demonstrates that Shamir's scheme is not secure against certain forms of cheating, and a small modification to his scheme retains the security and efficiency of the original and preserves the property that its security does not depend on any unproven assumptions such as the intractability of computing number-theoretic functions.
Journal ArticleDOI

Constructions and Properties of k out of nVisual Secret Sharing Schemes

TL;DR: Two general k out of n constructions that are related to those of maximum size arcs or MDS codes and the notion of coloured visual secret sharing schemes is introduced and a general construction is given.