Abstract
Visual cryptography scheme (VCS) is a kind of cryptography that can be directly decoded by human visual system when transparent films are stacked. It requires no computation for decryption and can be stored in physical materials such as films. Therefore VCS can be a basis for providing secure and dependable authentication scheme, because it cannot be harmed by electronic and/or computational tricks. In this paper, we develop VCS for authentication on smartphones. Several authentication schemes using VCS are designed. Image quality of VCS is an inevitable issue because of small display areas of mobile devices. Thus, we will deal with VCS for continuous-tone images (gray-scale images and color images) that can enhance the image quality of VCS, so that feasible authentication schemes for smartphones will be achieved by using this continuous-tone VCS. Our authentication scheme can avoid the inconvenience of using password everywhere in modern digital life, and also resists attacks from hackers and the man-in-middle attack. This type of authentication using VCS may have a huge impact on future authentication schemes for mobile devices.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)
Surekha, B., Swamy, G., Rao, K.S.: A multiple watermarking technique for images based on visual cryptography. Int. J. Comput. Appl. 1(11), 77–81 (2010)
Monoth, T., Anto, P.B.: Tamperproof transmission of fingerprints using visual cryptography schemes. Procedia Comput. Sci. 2, 143–148 (2010)
Weir, J., Yan, W.: Resolution variant visual cryptography for street view of google maps. In: Proceedings of ISCAS, pp. 1695–1698 (2010)
Yang, C.N., Chen, T.S., Ching, M.H.: Embed additional private information into two-dimensional barcodes by the visual secret sharing scheme. Integr. Comput. Aided Eng. 13(2), 189–199 (2006)
Naor, M., Pinkas, B.: Visual authentication and identification. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 322–336. Springer, Heidelberg (1997)
McCune, J.M., Perrig, A., Reiter, M.K.: Seeing-is-believing: using camera phones for human-verifiable authentication. In: Proceeidngs of IEEE Symposium on Security Privacy, pp. 110–124 (2005)
Yang, C.N., Chen, T.S.: Security analysis on authentication of images using recursive visual cryptography. Cryptologia 32(2), 131–136 (2008)
Borchert, B., Reinhardt, K.: Applications of visual cryptography. In: Chapter 12 of Visual Cryptography and Secret Image Sharing, Boca Raton, FL. CRC Press/Taylor and Francis (2011)
Jaya, Malik, S., Aggarwal, A., Sardana, A.: Novel authentication system using visual cryptography. In: Information and Communication Technologies (WICT), pp. 1181–1186 (2011)
Goel, M.B., Bhagat, V.B., Katankar, V.K.: Authentication framework using visual cryptography. Int. J. Res. Eng. Technol. 2, 271–274 (2013)
Ratheesh, V.R., Jogesh, J., Jayamohan, M.: A visual cryptographic scheme for owner authentication using embedded shares. Indian J. Comput. Sci. Eng. 5, 190–194 (2014)
Weir, J., Yan, W.: Authenticating visual cryptography shares using 2D barcodes. In: Shi, Y.Q., Kim, H.-J., Perez-Gonzalez, F. (eds.) IWDW 2011. LNCS, vol. 7128, pp. 196–210. Springer, Heidelberg (2012)
Nakajima, M., Yamaguchi, Y.: Enhancing registration tolerance of extended visual cryptography for natural images. J. Electron. Imaging 13, 654–662 (2004)
Chen, S.K., Lin, S.J., Lin, J.C.: Flip visual cryptography (FVC) with perfect security, conditionally-optimal contrast, and no expansion. J. Vis. Commun. Image Representation 21, 900–916 (2010)
Yang, C.N., Sun, L.Z., Yan, X., Kim, C.: Design a new visual cryptography for human-verifiable authentication in accessing a database. J. Real-Time Image Process. (2015). doi:10.1007/s11554-015-0511-9
Liverpool and Sefton Chambers of Commerce. http://www.liverpoolchamber.org.uk/article.aspx/show/5641
Global Patent & Technology Exchange. http://www.tynax.com/listing/4027
Acknowledgments
This work was supported in part by Ministry of Science and Technology, Taiwan, under Grant 104-2918-I-259-001 and 104-2221-E-259-013.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Yang, CN., Liao, JK., Wu, FH., Yamaguchi, Y. (2016). Developing Visual Cryptography for Authentication on Smartphones. In: Wan, J., Humar, I., Zhang, D. (eds) Industrial IoT Technologies and Applications. Industrial IoT 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 173. Springer, Cham. https://doi.org/10.1007/978-3-319-44350-8_19
Download citation
DOI: https://doi.org/10.1007/978-3-319-44350-8_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-44349-2
Online ISBN: 978-3-319-44350-8
eBook Packages: Computer ScienceComputer Science (R0)