摘要
在VC(可视密码)的实际应用中分发者和参与者均可能存在欺骗行为,导致秘密图像无法正确恢复,基于此提出了一种改进的防欺骗可视密码方案。该方案用(2,n+1)-VCS(可视密码方案)代替(k,n)-VCS来分享验证图像,不需要引入传统的TTP(可信第三方),可同时直接验证分发者和参与者的欺骗行为,提高了可视密码方案的实用性与安全性。
Both dealer and participants were likely to cheat in the practical application of visual cryptography. In order to make sure that the secret image resuming was not impacted,this paper put forward an improved cheater detectable visual cryptography scheme. It used( 2,n + 1)-VCS instead of( k,n)-VCS to verify the cheating problems directly from both dealer and participants without introducing the trusted third party( TTP),and improved the security and practicability of visual cryptography scheme.
引文
[1]Naor M,Shamir A.Visual cryptography[C]//Advances in Cryptology.New York:Springer-Verlag,1995:1-12.
[2]郭洁,颜浩,刘妍,等.一种可防止欺骗的可视密码分享方案[J].计算机工程,2005,31(6):126-128.
[3]徐晓辉,郁滨.无重影的可防欺骗视觉密码方案[C]//全国第18届计算机技术与应用学术会议论文集.合肥:中国科学技术大学出版社,2007:1335-1339.
[4]Yu Bin,Xu Xiaohui,Fang Liguo.Multi-secret sharing threshold visual cryptography scheme[C]//Proc of International Conference on Intelligence and Security Workshops.[S.l.]:IEEE Press,2007:815-818.
[5]郁滨,徐晓辉,房礼国.基于累积矩阵的可防欺骗视觉密码方案[J].电子与信息学报,2009,31(4):950-953.
[6]付正欣,王益伟,郁滨.一种像素不扩展的可验证视觉密码方案[C]//全国第20届计算机技术与应用学术会议论文集.合肥:中国科学技术大学出版社,2009:539-543.
[7]郁滨,徐晓辉,房礼国.基于概率法的防欺骗视觉密码方案[J].计算机应用,2009,29(7):1782-1784.
[8]De Prisco R,Santis C A.Cheating immune(2,n)-threshold visual secret sharing[C]//Lecture Notes in Computer Science,vol 4116.Berlin:Springer,2006:216-228.
[9]Horng G,Chen T,TSai D S.Cheating in visual cryptography[J].Designs,Codes and Cryptography,2006,38(2):219-236.
[10]Yu Bin,Fang Liguo,Xu Xiaohui.A verifiable visual cryptography scheme[C]//Proc of International Conference on Computational Intelligence and Security.Washington DC:IEEE Computer Society,2008:347-350.
[11]莫庆平,谭晓青.具有可信第三方的防欺骗可视密码方案[J].计算机应用研究,2011,28(7):2690-2693.
[12]Lee K H,Chiu P L.An extended visual cryptography algorithm for general access structures[J].IEEE Trans on Information Forensics and Security,2012,7(1):219-229.
[13]Askari N,Heys H M,Moloney C R.An extended visual cryptography scheme without pixel expansion for halftone images[C]//Proc of IEEE Canadian Conference of Electrical and Computer Engineering.2013.
[14]Shaji S,Paul G.Anti phishing approach using visual cryptography and iris recognition[J].International Journal of Research in Computer and Communication Technology,2014,3(3):88-92.
[15]Ross A,Othman A.Visual cryptography for biometric privacy[J].IEEE Trans on Information Forensics and Security,2011,6(1):70-81.