130 likes | 274 Views
Cheating immune threshold visual secret sharing. Author: R. De Prisco and A. De Santis Source: The Computer Journal, 2009 Presenter: Yu-Chi Chen. Outline. Introduction Model of VC Definition of cheating A better (2, n )-threshold scheme Conclusions. Introduction.
E N D
Cheating immune threshold visual secret sharing Author: R. De Prisco and A. De Santis Source: The Computer Journal, 2009 Presenter: Yu-Chi Chen
Outline • Introduction • Model of VC • Definition of cheating • A better (2,n)-threshold scheme • Conclusions
Introduction • Visual Cryptography (visual secret sharing) • Naor and Shamir, 1994 • Cheating in VC • Horng et al., 2006 • A speech in our seminar, 1/14, by C.C. Chang.
Introduction • Two types of cheating prevention in VC • Share authentication • Blind authentication • De Prisco and De Santis presented a formal definition for cheating, and described deterministic cheating.
Introduction • De Prisco and De Santis proposed a better (2,n) scheme that is blind authentication and immune to deterministic cheating without relying on a complementary image. • The previous schemes have to use a complementary image to protect both black and white pixels.
Outline • Introduction • Model of VC • Definition of cheating • A better (2,n)-threshold scheme • Conclusions
Model of VC - (k,n) • Encoding: Given a secret image, the dealer generates n transparencies, where k transparencies can stack to recover the secret image. • Distributing: The dealer gives each transparencies to each participant. • Decoding: k participants can recover the secret image by stacking their transparencies.
Definition of cheating • Deterministic cheating • pr(0→1)=1 and pr(1→0)=1 for all pixels • Cheating immune • pr(0→1)<1 and pr(1→0)<1 for all pixels
Outline • Introduction • Model of VC • Definition of cheating • A better (2,n)-threshold scheme • Conclusions
A better (2,n)-threshold scheme • A pixel becomes 2n+1+n subpixels. The base matrix is n × (2n+1+n). • 2n: binary coding • 1: all 0 column • n: Naor-Shamir’s VC
Security analysis • They have proven this scheme is immune to deterministic cheating. • The cheaters are impossible to make sure the subpixel is 1 or 0 in victim’s. • The formal proof is given in the paper by De Prisco and De Santis.
Conclusions • The better scheme is the most secure scheme against deterministic cheating without relying on a complementary image.