Tagged visual cryptography with access control
Title | Tagged visual cryptography with access control |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Yi-Hui Chen, Chi-Shiang Chan, Po-Yu Hsu, Wei-Lin Huang |
Conference Name | Multimedia and Expo Workshops (ICMEW), 2014 IEEE International Conference on |
Date Published | July |
Keywords | Access Control, authentication, authorisation, Authorization, cryptography, Encryption, Equations, Image coding, image secret sharing scheme, lossless construction ability, meaningless share images, message authentication, Pattern recognition, printed pattern, secret image, secret sharing, self-authentication mechanism, Stacking, tagged visual cryptography, visual cryptography, visualization |
Abstract | Visual cryptography is a way to encrypt the secret image into several meaningless share images. Noted that no information can be obtained if not all of the shares are collected. Stacking the share images, the secret image can be retrieved. The share images are meaningless to owner which results in difficult to manage. Tagged visual cryptography is a skill to print a pattern onto meaningless share images. After that, users can easily manage their own share images according to the printed pattern. Besides, access control is another popular topic to allow a user or a group to see the own authorizations. In this paper, a self-authentication mechanism with lossless construction ability for image secret sharing scheme is proposed. The experiments provide the positive data to show the feasibility of the proposed scheme. |
DOI | 10.1109/ICMEW.2014.6890648 |
Citation Key | 6890648 |
- meaningless share images
- visualization
- visual cryptography
- tagged visual cryptography
- Stacking
- self-authentication mechanism
- secret sharing
- secret image
- printed pattern
- Pattern recognition
- message authentication
- Access Control
- lossless construction ability
- image secret sharing scheme
- Image coding
- Equations
- encryption
- Cryptography
- authorization
- authorisation
- authentication