Visible to the public Tagged visual cryptography with access control

TitleTagged visual cryptography with access control
Publication TypeConference Paper
Year of Publication2014
AuthorsYi-Hui Chen, Chi-Shiang Chan, Po-Yu Hsu, Wei-Lin Huang
Conference NameMultimedia and Expo Workshops (ICMEW), 2014 IEEE International Conference on
Date PublishedJuly
KeywordsAccess Control, authentication, authorisation, Authorization, cryptography, Encryption, Equations, Image coding, image secret sharing scheme, lossless construction ability, meaningless share images, message authentication, Pattern recognition, printed pattern, secret image, secret sharing, self-authentication mechanism, Stacking, tagged visual cryptography, visual cryptography, visualization
Abstract

Visual cryptography is a way to encrypt the secret image into several meaningless share images. Noted that no information can be obtained if not all of the shares are collected. Stacking the share images, the secret image can be retrieved. The share images are meaningless to owner which results in difficult to manage. Tagged visual cryptography is a skill to print a pattern onto meaningless share images. After that, users can easily manage their own share images according to the printed pattern. Besides, access control is another popular topic to allow a user or a group to see the own authorizations. In this paper, a self-authentication mechanism with lossless construction ability for image secret sharing scheme is proposed. The experiments provide the positive data to show the feasibility of the proposed scheme.

DOI10.1109/ICMEW.2014.6890648
Citation Key6890648