Abstract
Since Noar and Shamir introduced visual cryptography scheme (VCS), the cheating problem of VCS has absorbed much attention of scholars. The current researches on cheating immune have one or more of these serious disadvantages: (1) each share has extra pixel expansion, (2) some methods need extra verification shares to determine the share is genuine or not, (3) some schemes require a higher encryption/decryption overhead, and (4) the authentication procedure needs a trusted third party. In order to establish a novel cheating immune visual cryptography scheme (CIVCS) without pixel expansion, this paper generates n original shares by using random grid based visual cryptography scheme (RG-based VCS) and stamps authentication patterns on original shares to obtain verifiable shares, where the authentication patterns are three adjacent and non-intersect concentric solid black rings. In authentication phase, the authentication patterns can be revealed respectively by stacking any two verifiable shares in several ways, including rotating one of the two shares by \(90^{\circ }\), \(180^{\circ }\), and \(270^{\circ }\) counterclockwise. The main contribution of this paper is that we propose a novel CIVCS without the above deficiencies. Furthermore, experimental results and theoretical proofs are provided for illustrating the effectiveness of the proposed CIVCS.
Similar content being viewed by others
References
Ateniese G, Blundo C, Santis AD, Stinson DR (1996) Visual cryptography for general access structures. Electron Colloquium Comput Complex 3(12):86–106
Chen TH, Tsao KH (2011) Threshold visual secret sharing by random grids. J Syst Softw 84(7):1197–1208
Chen TH, Tsao KH (2011) User-friendly random-grid-based visual secret sharing. IEEE Trans Circ Syst Video Technol 21(11):1693–1703
Guo T, Liu F, Wu CK (2013) Threshold visual secret sharing by random grids with improved contrast. J Syst Softw 86(8):2094–2109
Horng G, Chen T, Tsai DS (2006) Cheating in visual cryptography. Des Codes Cryptogr 38(2):219–236
Hou YC, Quan ZY, Tsai CF, Tseng AY (2013) Block-based progressive visual secret sharing. Inf Sci 233(1):290–304
Hsu HC, Chen TS, Lin YH (2004) The ringed shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharing. IEEE International Conference on Networking, Sensing and Control, pp 996–1001
Hu CM, Tzeng W (2007) Cheating immune in visual cryptography. IEEE Trans Image Process 16(1):36–45
Hu H, Shen G, Fu ZX, Yu B (2018) Improved contrast for threshold random-grid-based visual cryptography. KSII Trans Internet Inf Syst 12(7):3401–3420
Kafri O, Keren E (1987) Encryption of pictures and shapes by random grids. Optics Letters 12(6):377–379
Lin PY, Wang RZ, Chang YJ, Fang WP (2015) Prevention of cheating in visual cryptography by using coherent patterns. Inf Sci 301:61–74
Liu ZQ, Zhu GP, Ding F, Kwong S (2021) Weighted visual secret sharing for general access structures based on random grids. Signal Process Image Commun 92:116–129
Naor M, Shamir A (1994) Visual cryptography, EUROCRYPT’94, (LNCS, 950), 1–12
Prisco RD, Santis AD (2006) Cheating immune (2,n)-threshold visual secret sharing. SCN 216–228
Ren YW, Liu F, Guo T, Feng RQ, Lin DD (2017) Cheating immune visual cryptography scheme using Latin square. IET Inf Secur 11(4):211–219
Shyu SJ (2009) Image encryption by multiple random grids. Pattern Recognit 42(7):1582–1596
Tsai DS, Chen T, Horng G (2007) A cheating prevention scheme for binary visual cryptography with homogeneous secret images. Pattern Recognit 40(8):2356–2366
Wu CC, Chen LH (1998) A study on visual cryptography. Master Thesis. Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R.O.C,
Wu XT, Lai ZR (2019) Random grid based color visual cryptography scheme for black and white secret images with general access structures. Signal Process Image Commun 75:100–110
Wu XT, Sun W (2013) Random grid-based visual secret sharing with abilities of OR and XOR decryptions. J Vis Commun Image Represent 24(1):48–62
Wu XT, Sun W (2013) Improving the visual quality of random grid-based visual secret sharing. Signal Process 93(5):977–995
Yadav MR (2020) Cheating prevention and detection technique in visual secret sharing. Ingnierie des Systmes d Inf 25(4):453–460
Yan XH, Lu YL (2018) Participants increasing for threshold random grids-based visual secret sharing. J Real Time Image Process 14(1):13–24
Yang CN (2004) New visual secret sharing schemes using probabilistic method. Pattern Recognit Lett 25(4):481–494
Yang CN, Laih CS (1999) Some new types of visual secret sharing schemes. Proc National Computer Symp 3:260–268
Yang CN, Lin YC, Li P (2020) Cheating immune k-out-of-n block-based progressive visual cryptography. J Inf Secur Appl 55:2214–2216
Acknowledgements
This research is supported by the National Key Research and Development Program of China (Grant No. 2018YFA0704703), the National Natural Science Foundation of China (Grant No. 61971243), the Natural Science Foundation of Tianjin (20JCZDJC00610), the Fundamental Research Funds for the Central Universities of China (Nankai University), and by the Ph.D. Candidate Research Innovation Fund of Nankai University.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Zhao, Y., Fu, FW. A cheating immune (k, n) visual cryptography scheme by using the rotation of shares. Multimed Tools Appl 81, 6235–6257 (2022). https://doi.org/10.1007/s11042-021-11692-4
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-021-11692-4