Skip to main content

Developing Visual Cryptography for Authentication on Smartphones

  • Conference paper
  • First Online:
Industrial IoT Technologies and Applications (Industrial IoT 2016)

Abstract

Visual cryptography scheme (VCS) is a kind of cryptography that can be directly decoded by human visual system when transparent films are stacked. It requires no computation for decryption and can be stored in physical materials such as films. Therefore VCS can be a basis for providing secure and dependable authentication scheme, because it cannot be harmed by electronic and/or computational tricks. In this paper, we develop VCS for authentication on smartphones. Several authentication schemes using VCS are designed. Image quality of VCS is an inevitable issue because of small display areas of mobile devices. Thus, we will deal with VCS for continuous-tone images (gray-scale images and color images) that can enhance the image quality of VCS, so that feasible authentication schemes for smartphones will be achieved by using this continuous-tone VCS. Our authentication scheme can avoid the inconvenience of using password everywhere in modern digital life, and also resists attacks from hackers and the man-in-middle attack. This type of authentication using VCS may have a huge impact on future authentication schemes for mobile devices.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)

    Google Scholar 

  2. Surekha, B., Swamy, G., Rao, K.S.: A multiple watermarking technique for images based on visual cryptography. Int. J. Comput. Appl. 1(11), 77–81 (2010)

    Google Scholar 

  3. Monoth, T., Anto, P.B.: Tamperproof transmission of fingerprints using visual cryptography schemes. Procedia Comput. Sci. 2, 143–148 (2010)

    Article  Google Scholar 

  4. Weir, J., Yan, W.: Resolution variant visual cryptography for street view of google maps. In: Proceedings of ISCAS, pp. 1695–1698 (2010)

    Google Scholar 

  5. Yang, C.N., Chen, T.S., Ching, M.H.: Embed additional private information into two-dimensional barcodes by the visual secret sharing scheme. Integr. Comput. Aided Eng. 13(2), 189–199 (2006)

    Google Scholar 

  6. Naor, M., Pinkas, B.: Visual authentication and identification. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 322–336. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  7. McCune, J.M., Perrig, A., Reiter, M.K.: Seeing-is-believing: using camera phones for human-verifiable authentication. In: Proceeidngs of IEEE Symposium on Security Privacy, pp. 110–124 (2005)

    Google Scholar 

  8. Yang, C.N., Chen, T.S.: Security analysis on authentication of images using recursive visual cryptography. Cryptologia 32(2), 131–136 (2008)

    Article  Google Scholar 

  9. Borchert, B., Reinhardt, K.: Applications of visual cryptography. In: Chapter 12 of Visual Cryptography and Secret Image Sharing, Boca Raton, FL. CRC Press/Taylor and Francis (2011)

    Google Scholar 

  10. Jaya, Malik, S., Aggarwal, A., Sardana, A.: Novel authentication system using visual cryptography. In: Information and Communication Technologies (WICT), pp. 1181–1186 (2011)

    Google Scholar 

  11. Goel, M.B., Bhagat, V.B., Katankar, V.K.: Authentication framework using visual cryptography. Int. J. Res. Eng. Technol. 2, 271–274 (2013)

    Google Scholar 

  12. Ratheesh, V.R., Jogesh, J., Jayamohan, M.: A visual cryptographic scheme for owner authentication using embedded shares. Indian J. Comput. Sci. Eng. 5, 190–194 (2014)

    Google Scholar 

  13. Weir, J., Yan, W.: Authenticating visual cryptography shares using 2D barcodes. In: Shi, Y.Q., Kim, H.-J., Perez-Gonzalez, F. (eds.) IWDW 2011. LNCS, vol. 7128, pp. 196–210. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  14. Nakajima, M., Yamaguchi, Y.: Enhancing registration tolerance of extended visual cryptography for natural images. J. Electron. Imaging 13, 654–662 (2004)

    Article  Google Scholar 

  15. Chen, S.K., Lin, S.J., Lin, J.C.: Flip visual cryptography (FVC) with perfect security, conditionally-optimal contrast, and no expansion. J. Vis. Commun. Image Representation 21, 900–916 (2010)

    Article  Google Scholar 

  16. Yang, C.N., Sun, L.Z., Yan, X., Kim, C.: Design a new visual cryptography for human-verifiable authentication in accessing a database. J. Real-Time Image Process. (2015). doi:10.1007/s11554-015-0511-9

    Google Scholar 

  17. Liverpool and Sefton Chambers of Commerce. http://www.liverpoolchamber.org.uk/article.aspx/show/5641

  18. Global Patent & Technology Exchange. http://www.tynax.com/listing/4027

Download references

Acknowledgments

This work was supported in part by Ministry of Science and Technology, Taiwan, under Grant 104-2918-I-259-001 and 104-2221-E-259-013.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ching-Nung Yang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Yang, CN., Liao, JK., Wu, FH., Yamaguchi, Y. (2016). Developing Visual Cryptography for Authentication on Smartphones. In: Wan, J., Humar, I., Zhang, D. (eds) Industrial IoT Technologies and Applications. Industrial IoT 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 173. Springer, Cham. https://doi.org/10.1007/978-3-319-44350-8_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-44350-8_19

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-44349-2

  • Online ISBN: 978-3-319-44350-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics