Abstract
We verify the achievement of information-theoretic security of Visual Cryptography (VC) based on the detailed attack scenario. In addition, practical VCs use pseudo-random permutation (PRP) as a random shuffle, which we also verify in this case. As a result, practical VCs only have computational security and require true random number generators (TRNGs) to achieve information-theoretic security. We derive a rational evaluation standard for VC’s security from the detailed attack scenario. Based on it, we consider an attack method using multiple shared images that is more effective than the brute-force search. In this study, we execute computer simulations of XOR differential attack on two shared images and observe the bias on the appearance frequency of the differential output. From these above results, we can conclude that it is necessary to generate the basis matrices with the same Hamming weight for all rows to guarantee the security of VCs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Mathematica. https://www.wolfram.com/mathematica/
Aravind, K., Krishnan, M.R.M.V.: Anti-phishing framework for banking based on visual cryptography. Int. J. Comput. Sci. Mob. Appl. 2(1), 121–126 (2014)
Blundo, C., D’Arco, P., Santis, A.D., Stinson, D.R.: Contrast optimal threshold visual cryptography schemes. SIAM J. Discret. Math. 16(2), 224–261 (2003)
D’Arco, P., Prisco, R.D., Santis, A.D.: Measure-independent characterization of contrast optimal visual cryptography schemes. J. Syst. Softw. 95, 89–99 (2014)
Dutta, S., Adhikari, A., Ruj, S.: Maximal contrast color visual secret sharing schemes. Des. Codes Cryptogr. 87(7), 1699–1711 (2019)
Hofmeister, T., Krause, M., Simon, H.U.: Contrast-optimal k out of n secret sharing schemes in visual cryptography. Theor. Comput. Sci. 240(2), 471–485 (2000)
Horng, G., Chen, T., Tsai, D.: Cheating in visual cryptography. Des. Codes Cryptogr. 38(2), 219–236 (2006)
Hou, Y., Quan, Z.: Progressive visual cryptography with unexpanded shares. IEEE Trans. Circuits Syst. Video Technol. 21(11), 1760–1764 (2011)
Iwamoto, M.: A weak security notion for visual secret sharing schemes. IEEE Trans. Inf. Forensics Secur. 7(2), 372–382 (2012)
Iwamoto, M., Yamamoto, H., Ogawa, H.: Optimal multiple assignments based on integer programming in secret sharing schemes with general access structures. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(1), 101–112 (2007)
James, D., Philip, M.: A novel anti phishing framework based on visual cryptography. In: 2012 International Conference on Power, Signals, Controls and Computation, pp. 1–5. IEEE (2012)
Jin, D., Yan, W., Kankanhalli, M.S.: Progressive color visual cryptography. J. Electron. Imaging 14(3), 033019 (2005)
Leung, B.W., Ng, F.Y., Wong, D.S.: On the security of a visual cryptography scheme for color images. Pattern Recogn. 42(5), 929–940 (2009)
Liu, F., Wu, C.K., Lin, X.J.: Cheating immune visual cryptography scheme. IET Inf. Secur. 5(1), 51–59 (2011)
Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995). https://doi.org/10.1007/BFb0053419
Okada, K., Koga, H.: A construction of the progressive (3, n)-threshold visual cryptography using a BIBD and analysis of its optimality. In: 2017 IEEE Information Theory Workshop, ITW 2017, Kaohsiung, Taiwan, 6–10 November 2017, pp. 249–253. IEEE (2017)
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
Shyu, S.J., Chen, M.C.: Optimum pixel expansions for threshold visual secret sharing schemes. IEEE Trans. Inf. Forensics Secur. 6(3–2), 960–969 (2011)
Weir, J., Yan, W.: Sharing multiple secrets using visual cryptography. In: International Symposium on Circuits and Systems (ISCAS 2009), Taipei, Taiwan, 24–17 May 2009, pp. 509–512. IEEE (2009)
Yamaguchi, Y.: Extended visual cryptography scheme for multiple-secrets continuous-tone images. Trans. Data Hiding Multim. Secur. 9, 25–41 (2014)
Yang, C., Laih, C.: New colored visual secret sharing schemes. Des. Codes Cryptogr. 20(3), 325–336 (2000)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Le Thanh Thai, B., Tanaka, H. (2023). A Study for Security of Visual Cryptography. In: El Hajji, S., Mesnager, S., Souidi, E.M. (eds) Codes, Cryptology and Information Security. C2SI 2023. Lecture Notes in Computer Science, vol 13874. Springer, Cham. https://doi.org/10.1007/978-3-031-33017-9_17
Download citation
DOI: https://doi.org/10.1007/978-3-031-33017-9_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-33016-2
Online ISBN: 978-3-031-33017-9
eBook Packages: Computer ScienceComputer Science (R0)