Jun 8 2006 Du-Shiau Tsaiab,Tzung-her Chenc and Gwoboa Hornga aDepartment of Computer Science, National Chung Hsing University bDepartment of Information Management, Hsiuping institue of Technology cDepartment of Computer Science and Information Engineering, National Chiayi University
Conspectus
Abstract Visual Cryptography Cheating in Visual Cryptography VC Cheating Protection Scheme Simulated Results Conclusion
Abstract
Naor and Shamir proposed the (k,n) Visual Cryptography(VC for short) scheme in 1995, and has been used in numerous applications. In 2006, Horng et al. proposed that cheating is possible in VC. In this study, a new scheme used Generic Algorithms(GA for short) is proposed to solve the cheating problem.
3
Visual Cryptography
The nm subpixels is described as an nm boolean matrix S=[Sij] such that Sij = 1 if and only if the jth subpixel of the ith share is black. A solution to the (k,n) VC scheme consists of two collections of nm boolean matrices C0(For white) and C1(For black). The solution is considered valid if the following three conditions are met 1.H(V) d-*m in C0 2.H(V) d in C1 3.For any subset {i1,i2,,iq} of {1,2,,n} with q < k, the two collections of qm matrices Dt for t{0,1} obtained by restricting each nm matrix in Ct (where t=0,1) to rows i1,i2,,iq are indistinguishable in the sense that they contain the same matrices with the same frequencies.
4
Horng et al. proposed that cheating is possible in (k,n) VC when k is smaller than n. The key point of cheating is how to predict and rearrange the positions of black and white subpixels in the victims and cheaters share. Figure 1. shows the whole cheating process and Table 1. shows the cheaters create to change the decoded image.
5
Pixel in Share Share Share Share Share pixel in pixel in pixel in Cheating pixel in pixel in Share SA Share SB Share SC Image Share SA Share SB
[1 0 0] [1 0 0] [1 0 0] [1 0 0] [1 0 0] [1 0 0] white black [1 0 0] [0 1 0] [1 0 0] [0 0 1]
Case3
black
[1 0 0]
[0 1 0]
[0 0 1]
white
[0 0 1]
[0 0 1]
Case4
black
[1 0 0]
[0 1 0]
[0 0 1]
black
[1 0 0]
[0 1 0]
Figure 2. shows the process to proposed scheme. First, The rotation process turns SI with n C different degrees of angle to generate 2 SI. Second, used GA to proposed scheme.
New generation
MatingPool
Reproduction
Crossover
10
Simulated Results(1)
12
Simulated Results(2)
13
Conclusion
The proposed scheme does against the cheating attack in VC. The GA based share construction method provides another direction for creating shares.
14