Abstract
Visual Cryptography (VC) has been developed as a significant research arena in media security. Despite of its obvious strengths, recent investigations have debated this scheme from adverse aspects, its problem is lack of authentication of VC shares, VC authentication related to digital image processing and cryptography has not been fully integrated together in the past years. In this paper, we analyze both visual features and cryptographic features of VC shares and take use of them for VC authentication. Compared to those existing methods, our contribution is the first one to integrate visual features and cryptographic features of VC shares into Hash code for the purpose of VC authentication.
Similar content being viewed by others
References
Chen Y, Tsai D-S, Horng G (2012) Comment on “cheating prevention in visual cryptography. IEEE Trans Image Process 21:3319–3323
Corke P (2011) Image feature extraction robotics. Vision Control, Springer 73:335–379
Corke P (2011) Image feature extraction. Robotics, Vision Control, Springer 73:335–379
Desmedt Y, Van Le T (2000) Moire cryptography. In: the 7th ACM conference on Computer and Communications Security, 116–124
Hersch RD, Chosson S (2004) Band moiré images. ACM Trans Graphics (TOG) 23(3):239–247
Hou Y, Chang C, Tu S (2001) Visual cryptography for color images based on halftone technology. In IEEE conference on Image, Acoustic, Speech and Signal Processing
Hu C, Tzeng W (2007) Cheating prevention in visual cryptography. IEEE Trans Image Process 16(1):36–45
Indebetouw G, Czarnek R (1992) Selected papers on optical Moire and applications. Society of Photo Optical, 64
Jin D, Yan W, Kankanhalli M (2005) Progressive color visual cryptography. J Electronic Imaging, 14(3)
Liao S, Huang T (2013) Video copy-move forgery detection and localization based on Tamura texture features. The 6th International Congress on Image and Signal Processing (CISP)
Liu F, Yan W (2015) Visual cryptography for image processing and security theory, methods, and applications, Springer. (2-nd Edition)
Memon N, Wong P (1998) Protecting digital media content. Commun ACM 41(7):35–43
Naor M, Shamir A (1995) Visual cryptography. In advances in cryptology. Eurocrypt 94:1–12, Springer
Stallings W (2013) Inside SHA-3. IEEE Potentials 32(6):26–31
Tamura H, Mori S, Yamawaki T (1978) Textural features corresponding to visual perception. IEEE Trans Systems, Man Cybernetics 8(6):460–473
Wang G (2015) Content based authentication of visual cryptography. Master Thesis, Auckland University of Technology, New Zealand
Wang G, Liu F, Yan W (2014) Braille for visual cryptography. IEEE International Symposium on Multimedia, Taichung, Taiwan, pp. 175–276
Wang G, Liu F, Yan W (2016) 2D Barcodes for visual cryptography. Multimedia Tools Appl 75(2):1223–1241
Weir J, Yan W (2009) Sharing multiple secrets using VC. In IEEE ISCAS, 509–512
Weir J, Yan W (2009) Dot-size variant VC. In: IWDW 2009 (LNCS, 5703), 136–148, Springer
Weir J, Yan W (2010) A comprehensive study of VC. In: springer transactions on data hiding and multimedia security V, 70–105. Springer (LNCS 6010)
Weir J, Yan W (2012) Authenticating VC shares using 2D Barcodes. In: IWDW 2012: 196–210. Springer (LNCS 7128)
Weir J, Yan W (2012) Visual cryptography and its applications, Bookboon
Yan W, Jin D, Kankanhalli M (2004) Visual cryptography for print and scan applications. In IEEE ISCAS’04. 5, 572
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wang, G., Yan, W. & Kankanhalli, M. Content based authentication of visual cryptography. Multimed Tools Appl 76, 9427–9441 (2017). https://doi.org/10.1007/s11042-016-3549-1
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-016-3549-1