Skip to main content
Log in

Content based authentication of visual cryptography

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Visual Cryptography (VC) has been developed as a significant research arena in media security. Despite of its obvious strengths, recent investigations have debated this scheme from adverse aspects, its problem is lack of authentication of VC shares, VC authentication related to digital image processing and cryptography has not been fully integrated together in the past years. In this paper, we analyze both visual features and cryptographic features of VC shares and take use of them for VC authentication. Compared to those existing methods, our contribution is the first one to integrate visual features and cryptographic features of VC shares into Hash code for the purpose of VC authentication.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Chen Y, Tsai D-S, Horng G (2012) Comment on “cheating prevention in visual cryptography. IEEE Trans Image Process 21:3319–3323

    Article  MathSciNet  Google Scholar 

  2. Corke P (2011) Image feature extraction robotics. Vision Control, Springer 73:335–379

    Article  Google Scholar 

  3. Corke P (2011) Image feature extraction. Robotics, Vision Control, Springer 73:335–379

    Article  Google Scholar 

  4. Desmedt Y, Van Le T (2000) Moire cryptography. In: the 7th ACM conference on Computer and Communications Security, 116–124

  5. Hersch RD, Chosson S (2004) Band moiré images. ACM Trans Graphics (TOG) 23(3):239–247

    Article  Google Scholar 

  6. Hou Y, Chang C, Tu S (2001) Visual cryptography for color images based on halftone technology. In IEEE conference on Image, Acoustic, Speech and Signal Processing

  7. Hu C, Tzeng W (2007) Cheating prevention in visual cryptography. IEEE Trans Image Process 16(1):36–45

    Article  MathSciNet  MATH  Google Scholar 

  8. Indebetouw G, Czarnek R (1992) Selected papers on optical Moire and applications. Society of Photo Optical, 64

  9. Jin D, Yan W, Kankanhalli M (2005) Progressive color visual cryptography. J Electronic Imaging, 14(3)

  10. Liao S, Huang T (2013) Video copy-move forgery detection and localization based on Tamura texture features. The 6th International Congress on Image and Signal Processing (CISP)

  11. Liu F, Yan W (2015) Visual cryptography for image processing and security theory, methods, and applications, Springer. (2-nd Edition)

  12. Memon N, Wong P (1998) Protecting digital media content. Commun ACM 41(7):35–43

    Article  Google Scholar 

  13. Naor M, Shamir A (1995) Visual cryptography. In advances in cryptology. Eurocrypt 94:1–12, Springer

    MATH  Google Scholar 

  14. Stallings W (2013) Inside SHA-3. IEEE Potentials 32(6):26–31

    Article  Google Scholar 

  15. Tamura H, Mori S, Yamawaki T (1978) Textural features corresponding to visual perception. IEEE Trans Systems, Man Cybernetics 8(6):460–473

    Article  Google Scholar 

  16. Wang G (2015) Content based authentication of visual cryptography. Master Thesis, Auckland University of Technology, New Zealand

  17. Wang G, Liu F, Yan W (2014) Braille for visual cryptography. IEEE International Symposium on Multimedia, Taichung, Taiwan, pp. 175–276

  18. Wang G, Liu F, Yan W (2016) 2D Barcodes for visual cryptography. Multimedia Tools Appl 75(2):1223–1241

    Article  Google Scholar 

  19. Weir J, Yan W (2009) Sharing multiple secrets using VC. In IEEE ISCAS, 509–512

  20. Weir J, Yan W (2009) Dot-size variant VC. In: IWDW 2009 (LNCS, 5703), 136–148, Springer

  21. Weir J, Yan W (2010) A comprehensive study of VC. In: springer transactions on data hiding and multimedia security V, 70–105. Springer (LNCS 6010)

  22. Weir J, Yan W (2012) Authenticating VC shares using 2D Barcodes. In: IWDW 2012: 196–210. Springer (LNCS 7128)

  23. Weir J, Yan W (2012) Visual cryptography and its applications, Bookboon

  24. Yan W, Jin D, Kankanhalli M (2004) Visual cryptography for print and scan applications. In IEEE ISCAS’04. 5, 572

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to W. Yan.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, G., Yan, W. & Kankanhalli, M. Content based authentication of visual cryptography. Multimed Tools Appl 76, 9427–9441 (2017). https://doi.org/10.1007/s11042-016-3549-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-3549-1

Keywords

Navigation