Topic
Visual cryptography
About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: A cheating prevention scheme which precludes members of a group from collusive cheating by using additional images for verification by mutually verification in each pair of shared images.
Abstract: Visual cryptography, proposed by Naor and Shamir in 1995, is a scheme which decodes messages by using human visual sensitivity. Cheating has been proved to be possible in visual cryptography. We propose a cheating prevention scheme which precludes members of a group from collusive cheating by using additional images for verification. In each pair of shared images, we detect cheating by mutually verification. The result of verification is clear and directly perceived by the senses. It is a practical technique using authenticating images while the structure of the secret is complex.
1 citations
••
01 Dec 2018TL;DR: An access control system using VCS and Steganography is proposed which separates the system into different privilege levels and can grant different Read/Write permissions to access a specific level to participants based on their roles.
Abstract: Visual Cryptographic Scheme(VCS) is a type of cryptography in which an image is split into shares, and can be decrypted only by superimposing those shares. In this paper, the authors propose an access control system using VCS and Steganography. Authentication Schemes have previously been proposed using VCS. The Authors introduce a model which separates the system into different privilege levels and can grant different Read/Write permissions to access a specific level to participants based on their roles.
1 citations
••
TL;DR: A version of a visual cryptography scheme in which a qualified set of participants is able to block the reconstruction of the secret.
Abstract: We present a version of a visual cryptography scheme in which a
qualified set of participants is able to block the reconstruction of the secret.
1 citations
•
TL;DR: This paper imports the scheme of visual cryptography into Kerberos protocol and constructs a new authentication scheme based on visual cryptography, and the result shows that the new scheme can resist password attack and replay attack.
Abstract: This paper introduces the authentication system of Kerberos protocol, and has a detailed analysis of the Kerberos protocol securityOn this condition, it imports the scheme of visual cryptography into Kerberos protocol and constructs a new authentication scheme based on visual cryptographyIt analyses the safety of Kerberos protocol, and the result shows that the new scheme can resist password attack and replay attack
1 citations