Cheating Prevention Schemes for Visual Cryptography

Similar documents
An Authentication of Secretely Encrypted Message Using Half-Tone Pixel Swapping From Carrier Stego Image

A NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME

The Comparative Study on Visual Cryptography and Random Grid Cryptography

A Novel Model for Encryption of Telugu Text Using Visual Cryptography Scheme

Recursive Information Hiding in Visual Cryptography

Meaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques

Design and Performance Evaluation of Boolean based Secret Image Sharing Scheme

Research Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography

Visual Cryptography Scheme with Authentication Using Shamir Andmk Reddy Techniques

A reversible data hiding based on adaptive prediction technique and histogram shifting

ABSTRACT I. INTRODUCTION

A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD BASED ON HISTOGRAM MODIFICATION AND VISUAL CRYPTOGRAPHY. Hang-Yu Fan and Zhe-Ming Lu

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

Visual Secret Sharing Scheme using Grayscale Images

Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography

IMPROVED ALGORITHM FOR VISUAL CRYPTOGRAPHY USING REGION INCREMENTATION

arxiv: v1 [cs.cr] 31 Dec 2018

Mody University of Science and Technology Laxmangarh, Sikar, India, Pin

Visual Cryptography of Animated GIF Image Based on XOR Operation

SECURITY PROTECTION OF SOFTWARE PROGRAMS BY INFORMATION SHARING AND AUTHENTICATION TECHNIQUES USING INVISIBLE ASCII CONTROL CODES*

User-Friendly Sharing System using Polynomials with Different Primes in Two Images

Data Hiding on Text Using Big-5 Code

Visual Secret Sharing Scheme with Autostereogram*

Threshold Visual Cryptography Scheme for Color Images with No Pixel Expansion

A NovelQR-Code Authentication Protocol Using Visual Cryptography for Secure Communications

A Modified Approach for Kerberos Authentication Protocol with Secret Image by using Visual Cryptography

Chapter 2 Various Problems in Visual Cryptography

A Reversible Data Hiding Scheme for BTC- Compressed Images

Implementation of IRIS recognition for Securing Online Payment

Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program

Identity verification system: a visual cryptography-based approach to prevent fraudulent in admission process

Visual Cryptography Scheme for Colored Image using XOR with Random Key Generation

An Efficient Self-Embedding Watermarking Scheme for Colour Image Tamper Detection and Recovery

An Efficient and Secure Multi-server Smart Card based Authentication Scheme

Smart-card-loss-attack and Improvement of Hsiang et al. s Authentication Scheme

Image Tamper Detection and Recovery Based on Dual Watermarks Sharing Strategy

Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction

A Smart Card Based Authentication Protocol for Strong Passwords

Robust copyright protection scheme for digital images using the low-band characteristic

Public-key Cryptography: Theory and Practice

Reversible Data Hiding VIA Optimal Code for Image

Available online at ScienceDirect. Procedia Computer Science 78 (2016 ) 95 99

Comments on four multi-server authentication protocols using smart card

Implementation of ContourLet Transform For Copyright Protection of Color Images

Information Cloaking Technique with Tree Based Similarity

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

Remote User Authentication Scheme in Multi-server Environment using Smart Card

Enhanced Phishing Detection based on Image Differentiation

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS

Attribute Based Encryption with Privacy Protection in Clouds

REVERSIBLE DATA HIDING SCHEME BASED ON PREDICTION ERROR SORTING AND DOUBLE PREDICTION.

Improved Qualitative Color Image Steganography Based on DWT

A Study of Prevention of Phishing Threats using Visual Cryptography

A LITERATURE SURVEY ON NOVEL REMOTE AUTHENTICATION VIA VIDEO OBJECT AND BIOMETRICS

Random Traversing Based Reversible Data Hiding Technique Using PE and LSB

Secure Smart Card Based Remote User Authentication Scheme for Multi-server Environment

(2, n)-visual Cryptographic Schemes For Color Images With Low Pixel Expansion

Human-Machine Identification Using Visual Cryptography

Encrypting the Auto Detected Face Part of Human in a Image Using RC4 and Hiding the Data in Image

GA Based Reversible Data Hiding in Encrypted Images by Reserving Room before Encryption

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach

A Formula Diamond Encoding Data Hiding Scheme

Robust Image Watermarking based on DCT-DWT- SVD Method

COMPARATIVE STUDY OF HISTOGRAM SHIFTING ALGORITHMS FOR DIGITAL WATERMARKING

The Modified Scheme is still vulnerable to. the parallel Session Attack

Security Weaknesses of a Biometric-Based Remote User Authentication Scheme Using Smart Cards

An efficient and practical solution to secure password-authenticated scheme using smart card

Robust Steganography Using Texture Synthesis

A SEMI-FRAGILE BLIND WATERMARKING SCHEME FOR COLOR IMAGES BASED ON VISUAL CRYPTOGRAPHY AND DISCRETE COSINE TRANSFORM

A SECURE PASSWORD-BASED REMOTE USER AUTHENTICATION SCHEME WITHOUT SMART CARDS

Recursive Visual Secret Sharing Scheme using Fingerprint. Authentication

KEYWORDS: Least Significant Bits(LSB),Discrete Cosine Tranform(DCT),H.264 AVC/SVC. INTRODUCTION Steganography is the science of hiding secret RESULT:

Information and Knowledge Management ISSN (Paper) ISSN X (Online) Vol 2, No.2, 2012

DYADIC WAVELETS AND DCT BASED BLIND COPY-MOVE IMAGE FORGERY DETECTION

An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings

Nigori: Storing Secrets in the Cloud. Ben Laurie

Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator

Visual Cryptography for Authentication Using CAPTCHA

Cryptanalysis and Improvement of a Dynamic ID Based Remote User Authentication Scheme Using Smart Cards

Image Error Concealment Based on Watermarking

SECURED TRANSMISSION OF BIOMETRIC CONTENT USING VISUAL CRYPTOGRAPHY

A New Approach to Compressed Image Steganography Using Wavelet Transform

Steganography. Brent McClain Rob Carey

Steganography using MATLAB

Stegano-CryptoSystem for Enhancing Biometric-Feature Security with RSA

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method

CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM

Secured Double Layer Data Hiding Using Encryption and Decryption Techniques

Comparison of Wavelet Based Watermarking Techniques for Various Attacks

An Information Hiding Scheme Based on Pixel- Value-Ordering and Prediction-Error Expansion with Reversibility

Log File Modification Detection and Location Using Fragile Watermark

CHAPTER-4 WATERMARKING OF GRAY IMAGES

The Password Change Phase is Still Insecure

Attribute-based encryption with encryption and decryption outsourcing

A Hybrid Authentication Protocol Using Quantum Entanglement and Symmetric Cryptography

A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems.

Security Analysis of Shim s Authenticated Key Agreement Protocols from Pairings

ISSN X INFORMATION TECHNOLOGY AND CONTROL, 2011, Vol.40, No.3. ISSN X INFORMATION TECHNOLOGY AND CONTROL, 2011 Vol.?, No.?, 1?

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network

Transcription:

Cheating Prevention Schemes for Visual Cryptography Biltta P George Computer Science and Engineering Adi Shankara Institute of Engineering and Technology Kalady, India Deepika M P Computer Science and Engineering Adi Shankara Institute of Engineering and Technology Kalady, India Abstract Visual cryptography is an encryption technique to encrypt a secret image into different shares such that stacking a sufficient number of shares reveals the secret image. Most of the previous research work on VC focuses on improving two parameters: pixel expansion and contrast. We considered the cheating problem in the visual cryptography scheme and investigate various cheating prevention schemes. During the reconstruction of the secret, one participant, called cheater, may release a false share. As a result a fake image will be revealed. Keywords Visual cryptography; cheating;cheating prevention; fake share I. INTRODUCTION Visual cryptography is first introduced by Naor and Shamir in 1995[11].The main concern of all the encryption technique is to protect the important data from being tampered or modified. In 2006 Horng et al. proposed that cheating is possible in (k, n) VC when k is smaller than n. The dishonest participants (cheaters) collude and want to fool victims, which is called cheating activity (CA).CA cause unpredictable damage to the victims; therefore, the victims accept a fake secret image (cheating image) different from the actual secret image as authentic. Cheating process can be divided into two: Individual cheating (IC) and co-cheating (CC).Individual cheating (IC) is employed by a single participant. During the secret recovering phase a certain participant presents a false or fake share images. Since the secret image cannot be reconstructed correctly. Moreover, the secret image can be revealed by deception if the cheater gets enough shares. Another way of cheating is called co-cheating (CC), accomplished by several collusive participants. Target s shares can be guessed with the shares they have in hand. Based on the assumption, the collusive cheaters create some fake shares; the stacking of fake and genuine shares together reveals a cheating image instead of the real secret image. A participant colluding is an important issue of cheater detectable visual cryptography schemes [7]. A visual secret-sharing scheme is said to be a cheating prevention scheme if the probability of successful cheating is negligble.there are two approaches in designing CPVCS schemes. One is based on share authentication where each member is provided with an additional share to validate other shares. The other is based on blind authentication where some property of the image is used to validate the reconstructed secret image. Thus, the objective of share authentication is to provide the members the ability to confirm the honesty of the shares before recreating secret images, and the objective of blind authentication is to make it tougher for the cheaters to guess the structure of the shares of the other members. II. RELATED WORK A secret sharing scheme allows a secret to be shared among a set of members, such that only authorized subsets of M can recover the secret, but any unauthorized subset cannot reveal the secret. In 1995, Naor and Shamir suggested a variant of secret sharing, called visual cryptography, [12] where the shares given to members are xeroxed onto transparencies. If A is an authorized subset of M, then the members in M can visually recover the secret image by stacking their transparencies together without performing any computation. Horng et al. [1] showed that cheating is possible in (k; n)-, traditional secret sharing. The cheating activity (CA) can cause unpredictable damage to sufferers, when sufferers accept a fake secret image different from the actual secret image as authentic. In their cheating method, the cheater needs to know the exact distribution of black and white sub pixels of the shares of honest participants. Based on this characteristic, they proposed a cheat-preventing method (HCT1) or an authentication based cheating prevention scheme to prevent the cheater from obtaining the distribution. However, the knowledge of the distribution is not a necessary condition for a successful cheat. They also proposed another cheat-preventing method (HCT2) or 2-out of (N+L) cheating prevention scheme, in which the assembling of the genuine share and verification share reveals the verification image in some small region. It is possible to attack the method. Hu and Tzeng [2] presented three kinds of cheating activities: CA-1, CA-2, and CA-3. They also gave a generic transformation that can make all schemes to achieve cheating prevention. HTCP scheme denotes Hu and Tzeng s transformation scheme, which is share authentication. The main idea of Hu-Tzeng s cheating prevention scheme uses a generic transformation to generate new transparencies with adding two subpixels to every block of every original 324

transparency. Then, this scheme generates a verification transparency for each participant such that the stacking result of the new transparency with the verification transparency will reveal a verification image. However, the extra verification share probably increases the risk and in addition, also produces share management issues for each participant. Yu-Chi Chen, Gwoboa Horng, and Du-Shiau Tsai [3] cryptanalyze the Hu Tzeng CP scheme and show that it is not cheating immune. Cryptographic schemes are very useful for realizing information security. The goal of cryptanalysis is to find potential weaknesses in a cryptographic scheme. De Prisco and De Santis [4] also measured the problem of cheating, and they showed that in (2, n)-, cheating is successful by n -1 collusive cheaters, and in (n, n)-, by 1 cheater. The collusive cheaters want to fool the victim for some reasons. De Prisco and De Santis proposed two cheating immune visual secret sharing schemes: the simple scheme and the better scheme. The better scheme is cheating prevention without a complementary image; therefore, for any black or white pixel, the cheaters cannot infer the actual value of victim s subpixels. But this method is Suffers from the deterministic white-to-black attack (DWtBA) and RCA (Region Cheating Attack). Tsai, Wang and Wu propose a cheating scheme [5] for Hu and Tzeng s transformation scheme. This cheating scheme reveals that not only that the secret share can be faked but that the verification share can be faked also. This can cause to the cheater to cheating other members by using the fake secret share and the fake verification share. Because of this, a new transformation scheme is proposed. This proposed transformation can alter the existing VC-scheme into the cheat preventing VC-scheme by referring the special position. This scheme does not need an extra verification share which can reduce the load of share management. In the existing VC schemes no security is provided to the secret shares and challengers can alter its bit sequences to create fake shares. And in the Invisible and Blind Watermarking scheme [6], the vulnerability of these binary secret shares is overcome by hiding them invisibly into some host images. The overlapping of these shares reveals the original secret. During the decryption phase, the secret shares are extracted from their cover images without needing any of the cover image characteristics because the watermark extraction technique is blind. Bin YU. et al [7] were researchers to recommend the Co Cheating prevention in Visual Cryptographic Schemes using trusty third party. In this scheme trusted third party act as a verifier and checking the genuinity of the shares simultaneously. The verifier keeps a rare verification share and n optional verification shares. Through a rare verification share and n optional verification shares, the reality of several shares can be identified concurrently. Shuo-Fang Hsu et al [8] were first researchers to present Verifiable Visual Cryptography scheme. The basic idea used in this scheme is to stamp a continuous pattern on the shares belonging to the same secret image. Also a part of the pattern can be revealed through aligning and stacking half of two share images together. Jana, B et al [9] introduced Cheating prevention in Visual Cryptography using steganographic Visual scheme. In order to prevent cheating in VC a steganographic scheme is used. In this scheme a secret message is embedded in each of the shares in random location during share generation phase called stego share. Before stacking operation the receiver can extract hidden message from stego share image for checking verification of share images. In this method no verification share image is required to prevent cheating in VC. III. CHEATING PREVENTION SCHEMES Most of the cheating prevention schemes are based on the traditional visual cryptography. Most usual disadvantages include the following: the scheme needs an online trusted authority, or it needs additional shares for the purpose of verification, or it has to sacrifice the properties by means of pixel expansion and contrast reduction of the original VCS or it can only be based on such VCS with specific access structures. Many studies focused on the cheating problems in VCS, and consequently many cheating prevention visual cryptography schemes (CPVCS) have been proposed. We classify the techniques in these CPVCSs as follows: 1. Make use of an online trusted authority who can verify the validity of the stacked shares. 2. Generate extra verification shares to verify the validity of the stacked shares. 3. Expand the pixel expansion of the scheme to embed extra authentication information 4. Generate more than n shares to reduce the possibility that the cheaters can correctly guess the distribution of the victims shares. 5. Make use of the genetic algorithm to encrypt homogeneous secret images By observing the above techniques, we found that the first technique is not practical in real applications, because the beauty of VCS is its simplicity, which is meant to be useful even when no computer network is available. The second technique requires the extra verification shares, which predictably increases the load of the participants. The third and fourth techniques increase the pixel expansion and reduce the contrast of the original VCS. The fifth technique requires strong computational overhead and degrades the quality of the recovered secret image, where the secret image can only be a password. It is also noted that most CPVCS can only be based on a VCS with specific access structure, for example, the (2, n) threshold access structure. 325

TABLE I. COMPARISON OF VARIOUS CHEATING PREVENTION SCHEMES sl.no Year& Author Type of Cheating Activity 2006, 1 Horng et.al[1] CA-1 Cheating Prevention Scheme HCT1 Advantages Simple Disadvantages Each participant Burdened with an extra verification share. 2 3 2006, Horng et.al[1] 2007,Hu and Tzeng[2] Extra verification transparency is required CA-2 HCT2 Simple Extra one share is used White pixels of secret image is vulnerable. (k,n)- CA HTCP Quite efficient Pixel expansion is large The contrast is Slightly reduced It generates two shares for each participant. 4 5 6 2010, DePrisco &DeSantis [4] 2010, De Priso & De Santis [4] 2010, A Novel Scheme for Mutual Authentication and Cheating Prevention[6] &(2,n)- CA-1,2, DD-CA CA-1,2, DD-CA DD1 DD2 CA Invisible and Blind Watermarking scheme Low computational complexity Transparency not required Image quality is improved by using perfect restoration technique Provides double security Verification transparency is required. Insecure Complex process 7 8 Bin YU. et al, CCPVC [7] 2011 Thasai,Wang,Wu[5] (k,n)-vcs CA CCPVC based on trusted third party (k,n)- CA Verification parameter based CPVCS Robust against various attacks like Blurring, Cropping,, Sharpening, JPEG Lossy compression Checking efficiency is good Small pixel expansion More secure Prevention based on a position Extra verification share is used Based on pixel position coordinate Pixel expansion (m+2n) Check both fake secrete share& fake verification share Reduce contrast No extra share needed Reduce the load of share management 326

9 2012, Tsai, Horng[11] (2,n)- for share transparency & (2,2)- For verification transparency HCT1, HT,DD2 A new ABCP Scheme Pixel Expansion is small than HT,DD1,DD2 HCT2 Verification is partially known 10 2013,Tsai, Horng[10] W Secure against Meaningful deterministic cheating A new cheating prevention (2,n) - Does not rely on added transparencies Low pixel expansion Applied only for (2,n) Scheme Verifiable message is required for each participant 11 2014,Jana B. et al[8] (n,n) CA-1,CA-2 Steganographic scheme No extra verification share is required Applicable only to TABLE II. COMPARISON OF VARIOUS CHEATING PREVENTION SCHEMES Scheme Type of Pixel Expansion Added Transparency Computational Complexity Type of C.P Security HCT1[1] 2n required O(n) SA insecure HCT2[1] HT[2] DD1[3] DD2[3] A new CP [10] Cheating Prevention using steganographic scheme[9] (k,n)-,k<n (2,n)- (n,n) 2(n+l) required O(n) BA secure* 2(n+2) required O(n) SA insecure 2(n+1) required O(n) BA secure* 2 n +n+1 no O(2 n ) BA insecure 2n+1 no O(n) SA secure 2n no O(n) BA secure Table II shows the comparisons of various CP schemes in the aspects of expansion of a pixel (Pixel Expansion), computational complexity, security against the meaningful deterministic cheating (Security), type of cheating prevention (Type of C.P., SA: share authentication, BA: blind authentication), and relying on added transparency or not (Added Transparency).* denotes the scheme must rely on complemental secret image to be secure. For the expansion of pixel, 2( ) denotes that the scheme relies on added transparencies. IV. CONCLUSION In this paper various cheating prevention schemes are studied. In today's information age, information sharing and transfer has increased exponentially. The threat of an intruder accessing secret information has been an ever existing concern 327

for the data communication experts. Cheating is possible in the Visual Cryptographic Schemes (VCS) by dishonest or malicious participant called a cheater, may provide a Fake Share (FS) to cheat the other participants. While selecting cheating prevention method in visual cryptography or in it must be space and time efficient. The cheat-preventing schemes are either not robust enough or still improvable. An efficient transformation of VCS for cheating prevention experiences minimum overhead on contrast and pixel expansion. It only added two sub pixels for each pixel in the image and the contrast is reduced only slightly. Cryptographic schemes are very useful for realizing information security. The goal of cryptanalysis is to find potential weaknesses in a cryptographic scheme. REFERENCES [1] G. Horng, T. H. Chen, and D. S. Tsai, Cheating in visual cryptography,des Codes, Cryptog., vol. 38, no. 2, pp. 219 236, Feb. 2006. [2] C. M. Hu and W. G. Tzeng, Cheating prevention in visual cryptography, IEEE Trans. Image Process., vol. 16, no. 1, pp. 36 45, Jan.2007. [3] G. Horng, T. H. Chen, D.S. Tsai, Cheating in visual cryptography, Des Codes Cryp-togr.38 (2)(2006)219 236. [4] R.De Prisco, A.De Santis, Cheating immune threshold visual secret sharing, Comput.J.53 (2010)1485 1496. [5] C.S Tasai,H.C.Wang,H.C Wu,C.H.M Wang, A Cheating Preventing Visual Cryptography Scheme By Referring The Special Position, International Journal Of Innovative Computing,Information And Control volume 7, N Umber 7(A),July 2011 [6] Aarti, Harsh K Verma, Pushpendra K Rajput, Ideal Contrast Secret Sharing Scheme through Meaningful Shares with Enveloping Digital Watermarking using Bit Plane based(k,n)- VCS, International Journal of Computer Applications Volume 46,No.9,May2012 [7] Bin YU, Jin-Yuan LU, Li-Guo FANG, A Co-cheating Prevention Visual Cryptography Scheme, Third International Conference on Information and Computing, 2010 Conference on Information and Computing, 2010 [8] Shuo-Fang Hsu ; Yu- Jie Chang; Ran-Zan Wang; Yeuan- Kuen Lee; Shih-Yu Huang, Verifiable Visual Cryptography Sixth International Conference on Genetic and Evolutionary Computing (ICGEC), 2012,464 467 [9] Jana, B. Mallick, M. ; Chowdhuri, P.; Mondal, S.K., Cheating prevention in Visual Cryptography using steganographic scheme, International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), 2014, 706 712. [10] Y.C. Chen, D. S. Tsai, G. Horng, visual secret sharing with cheating prevention revisited, digital signal processing 23 (2013)1496-1504 [11] Du- Shiau Tsai, Tzung-Her Chen,Gwoboa Horng,Acheating prevention scheme for binary visual cryptography with Homogeneous secret images,pattern recognition 40(2007) 2356 _ 2366,www.elsevier.com/locate/pr [12] Y.C. Chen, D. S. Tsai, G. Horng, A new authentication based cheating prevention scheme in Naor Shamir s visual cryptography, J. Vis. Commun. Image Represent.23(8)(2012)1225 1233. [13] M. Naor, A. Shamir, Visual cryptography, in: Proceedings of the Advances in Cryptology, 94, in: LNCS, vol.950, 1995, pp.1 12. 328