一种改进的防欺骗可视密码方案
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Improved visual cryptography scheme to prevent cheaters
  • 作者:张舒 ; 李薇 ; 艾小川
  • 英文作者:Zhang Shu;Li Wei;Ai Xiaochuan;Dept.of Mathematics,College of Science,Naval University of Engineering;
  • 关键词:欺骗者 ; 可视密码 ; 可信第三方 ; 秘密分享
  • 英文关键词:cheater;;visual cryptography(VC);;trusted third party(TTP);;secret sharing
  • 中文刊名:JSYJ
  • 英文刊名:Application Research of Computers
  • 机构:海军工程大学理学院应用数学系;
  • 出版日期:2016-04-29 10:46
  • 出版单位:计算机应用研究
  • 年:2016
  • 期:v.33;No.302
  • 基金:海军工程大学自然科学基金资助项目(HGDQNEQJJ15005)
  • 语种:中文;
  • 页:JSYJ201612056
  • 页数:4
  • CN:12
  • ISSN:51-1196/TP
  • 分类号:256-259
摘要
在VC(可视密码)的实际应用中分发者和参与者均可能存在欺骗行为,导致秘密图像无法正确恢复,基于此提出了一种改进的防欺骗可视密码方案。该方案用(2,n+1)-VCS(可视密码方案)代替(k,n)-VCS来分享验证图像,不需要引入传统的TTP(可信第三方),可同时直接验证分发者和参与者的欺骗行为,提高了可视密码方案的实用性与安全性。
        Both dealer and participants were likely to cheat in the practical application of visual cryptography. In order to make sure that the secret image resuming was not impacted,this paper put forward an improved cheater detectable visual cryptography scheme. It used( 2,n + 1)-VCS instead of( k,n)-VCS to verify the cheating problems directly from both dealer and participants without introducing the trusted third party( TTP),and improved the security and practicability of visual cryptography scheme.
引文
[1]Naor M,Shamir A.Visual cryptography[C]//Advances in Cryptology.New York:Springer-Verlag,1995:1-12.
    [2]郭洁,颜浩,刘妍,等.一种可防止欺骗的可视密码分享方案[J].计算机工程,2005,31(6):126-128.
    [3]徐晓辉,郁滨.无重影的可防欺骗视觉密码方案[C]//全国第18届计算机技术与应用学术会议论文集.合肥:中国科学技术大学出版社,2007:1335-1339.
    [4]Yu Bin,Xu Xiaohui,Fang Liguo.Multi-secret sharing threshold visual cryptography scheme[C]//Proc of International Conference on Intelligence and Security Workshops.[S.l.]:IEEE Press,2007:815-818.
    [5]郁滨,徐晓辉,房礼国.基于累积矩阵的可防欺骗视觉密码方案[J].电子与信息学报,2009,31(4):950-953.
    [6]付正欣,王益伟,郁滨.一种像素不扩展的可验证视觉密码方案[C]//全国第20届计算机技术与应用学术会议论文集.合肥:中国科学技术大学出版社,2009:539-543.
    [7]郁滨,徐晓辉,房礼国.基于概率法的防欺骗视觉密码方案[J].计算机应用,2009,29(7):1782-1784.
    [8]De Prisco R,Santis C A.Cheating immune(2,n)-threshold visual secret sharing[C]//Lecture Notes in Computer Science,vol 4116.Berlin:Springer,2006:216-228.
    [9]Horng G,Chen T,TSai D S.Cheating in visual cryptography[J].Designs,Codes and Cryptography,2006,38(2):219-236.
    [10]Yu Bin,Fang Liguo,Xu Xiaohui.A verifiable visual cryptography scheme[C]//Proc of International Conference on Computational Intelligence and Security.Washington DC:IEEE Computer Society,2008:347-350.
    [11]莫庆平,谭晓青.具有可信第三方的防欺骗可视密码方案[J].计算机应用研究,2011,28(7):2690-2693.
    [12]Lee K H,Chiu P L.An extended visual cryptography algorithm for general access structures[J].IEEE Trans on Information Forensics and Security,2012,7(1):219-229.
    [13]Askari N,Heys H M,Moloney C R.An extended visual cryptography scheme without pixel expansion for halftone images[C]//Proc of IEEE Canadian Conference of Electrical and Computer Engineering.2013.
    [14]Shaji S,Paul G.Anti phishing approach using visual cryptography and iris recognition[J].International Journal of Research in Computer and Communication Technology,2014,3(3):88-92.
    [15]Ross A,Othman A.Visual cryptography for biometric privacy[J].IEEE Trans on Information Forensics and Security,2011,6(1):70-81.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700