Skip to main content
Log in

A cheating immune (kn) visual cryptography scheme by using the rotation of shares

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Since Noar and Shamir introduced visual cryptography scheme (VCS), the cheating problem of VCS has absorbed much attention of scholars. The current researches on cheating immune have one or more of these serious disadvantages: (1) each share has extra pixel expansion, (2) some methods need extra verification shares to determine the share is genuine or not, (3) some schemes require a higher encryption/decryption overhead, and (4) the authentication procedure needs a trusted third party. In order to establish a novel cheating immune visual cryptography scheme (CIVCS) without pixel expansion, this paper generates n original shares by using random grid based visual cryptography scheme (RG-based VCS) and stamps authentication patterns on original shares to obtain verifiable shares, where the authentication patterns are three adjacent and non-intersect concentric solid black rings. In authentication phase, the authentication patterns can be revealed respectively by stacking any two verifiable shares in several ways, including rotating one of the two shares by \(90^{\circ }\), \(180^{\circ }\), and \(270^{\circ }\) counterclockwise. The main contribution of this paper is that we propose a novel CIVCS without the above deficiencies. Furthermore, experimental results and theoretical proofs are provided for illustrating the effectiveness of the proposed CIVCS.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Ateniese G, Blundo C, Santis AD, Stinson DR (1996) Visual cryptography for general access structures. Electron Colloquium Comput Complex 3(12):86–106

    MathSciNet  MATH  Google Scholar 

  2. Chen TH, Tsao KH (2011) Threshold visual secret sharing by random grids. J Syst Softw 84(7):1197–1208

    Article  Google Scholar 

  3. Chen TH, Tsao KH (2011) User-friendly random-grid-based visual secret sharing. IEEE Trans Circ Syst Video Technol 21(11):1693–1703

    Article  Google Scholar 

  4. Guo T, Liu F, Wu CK (2013) Threshold visual secret sharing by random grids with improved contrast. J Syst Softw 86(8):2094–2109

    Article  Google Scholar 

  5. Horng G, Chen T, Tsai DS (2006) Cheating in visual cryptography. Des Codes Cryptogr 38(2):219–236

    Article  MathSciNet  Google Scholar 

  6. Hou YC, Quan ZY, Tsai CF, Tseng AY (2013) Block-based progressive visual secret sharing. Inf Sci 233(1):290–304

    Article  Google Scholar 

  7. Hsu HC, Chen TS, Lin YH (2004) The ringed shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharing. IEEE International Conference on Networking, Sensing and Control, pp 996–1001

  8. Hu CM, Tzeng W (2007) Cheating immune in visual cryptography. IEEE Trans Image Process 16(1):36–45

    Article  MathSciNet  Google Scholar 

  9. Hu H, Shen G, Fu ZX, Yu B (2018) Improved contrast for threshold random-grid-based visual cryptography. KSII Trans Internet Inf Syst 12(7):3401–3420

    Google Scholar 

  10. Kafri O, Keren E (1987) Encryption of pictures and shapes by random grids. Optics Letters 12(6):377–379

    Article  Google Scholar 

  11. Lin PY, Wang RZ, Chang YJ, Fang WP (2015) Prevention of cheating in visual cryptography by using coherent patterns. Inf Sci 301:61–74

    Article  MathSciNet  Google Scholar 

  12. Liu ZQ, Zhu GP, Ding F, Kwong S (2021) Weighted visual secret sharing for general access structures based on random grids. Signal Process Image Commun 92:116–129

    Google Scholar 

  13. Naor M, Shamir A (1994) Visual cryptography, EUROCRYPT’94, (LNCS, 950), 1–12

  14. Prisco RD, Santis AD (2006) Cheating immune (2,n)-threshold visual secret sharing. SCN 216–228

  15. Ren YW, Liu F, Guo T, Feng RQ, Lin DD (2017) Cheating immune visual cryptography scheme using Latin square. IET Inf Secur 11(4):211–219

    Article  Google Scholar 

  16. Shyu SJ (2009) Image encryption by multiple random grids. Pattern Recognit 42(7):1582–1596

    Article  Google Scholar 

  17. Tsai DS, Chen T, Horng G (2007) A cheating prevention scheme for binary visual cryptography with homogeneous secret images. Pattern Recognit 40(8):2356–2366

    Article  Google Scholar 

  18. Wu CC, Chen LH (1998) A study on visual cryptography. Master Thesis. Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R.O.C,

  19. Wu XT, Lai ZR (2019) Random grid based color visual cryptography scheme for black and white secret images with general access structures. Signal Process Image Commun 75:100–110

    Article  Google Scholar 

  20. Wu XT, Sun W (2013) Random grid-based visual secret sharing with abilities of OR and XOR decryptions. J Vis Commun Image Represent 24(1):48–62

    Article  Google Scholar 

  21. Wu XT, Sun W (2013) Improving the visual quality of random grid-based visual secret sharing. Signal Process 93(5):977–995

    Article  Google Scholar 

  22. Yadav MR (2020) Cheating prevention and detection technique in visual secret sharing. Ingnierie des Systmes d Inf 25(4):453–460

    Google Scholar 

  23. Yan XH, Lu YL (2018) Participants increasing for threshold random grids-based visual secret sharing. J Real Time Image Process 14(1):13–24

    Article  Google Scholar 

  24. Yang CN (2004) New visual secret sharing schemes using probabilistic method. Pattern Recognit Lett 25(4):481–494

    Article  Google Scholar 

  25. Yang CN, Laih CS (1999) Some new types of visual secret sharing schemes. Proc National Computer Symp 3:260–268

    Google Scholar 

  26. Yang CN, Lin YC, Li P (2020) Cheating immune k-out-of-n block-based progressive visual cryptography. J Inf Secur Appl 55:2214–2216

    Google Scholar 

Download references

Acknowledgements

This research is supported by the National Key Research and Development Program of China (Grant No. 2018YFA0704703), the National Natural Science Foundation of China (Grant No. 61971243), the Natural Science Foundation of Tianjin (20JCZDJC00610), the Fundamental Research Funds for the Central Universities of China (Nankai University), and by the Ph.D. Candidate Research Innovation Fund of Nankai University.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yongkang Zhao.

Additional information

Publisher's note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhao, Y., Fu, FW. A cheating immune (kn) visual cryptography scheme by using the rotation of shares. Multimed Tools Appl 81, 6235–6257 (2022). https://doi.org/10.1007/s11042-021-11692-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-11692-4

Keywords

Navigation