Abstract
With visual cryptography in mind, the security property of a new scheme is always one of main concerns. However, the ideal security is not taken into account in some visual cryptography schemes sharing multiple secrets. In this paper, the security of a multi-secret visual cryptography scheme proposed by Feng et al. is analyzed. We show that the security of their scheme is not ideal. Precisely, it is insecure since some information of the secret images can be inferred by block attacking the second share alone. The main weak design is proved and shown by means of giving theoretical analysis and conducting some counter experiments.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)
Shamir, A.: How to share a secret. Communications of the ACM 22, 612–613 (1979)
Blakley, G.R.: Safeguarding cryptographic keys. In: Merwin, R.E., Zanca, J.T., Smith, M. (eds.) National Computer Conference, vol. 48, pp. 242–268. IEEE Press, New York (1979)
Ateniese, G., Blundo, C., Santis, A., De, S.D.R.: Visual cryptography for general access structures. Information and Computation 129, 86–106 (1996)
Hsu, C.-S., Tu, S.-F., Hou, Y.-C.: An optimization model for visual cryptography schemes with unexpanded shares. In: Esposito, F., Raś, Z.W., Malerba, D., Semeraro, G. (eds.) ISMIS 2006. LNCS (LNAI), vol. 4203, pp. 58–67. Springer, Heidelberg (2006)
Liu, F., Wu, C., Lin, X.: Step construction of visual cryptography schemes. IEEE T. Inf. Foren. Sec. 5, 27–38 (2010)
Shyu, S.J., Chen, M.C.: Optimum pixel expansions for threshold visual secret sharing schemes. IEEE T. Inf. Foren. Sec. 6, 960–969 (2011)
Yang, C.N., Wang, C.C., Chen, T.S.: Visual cryptography schemes with reversing. The Computer Journal. bxm118, 1–13 (2008)
Lin, C.C., Tai, W.H.: Visual cryptography for gray-level images by dithering techniques. Pattern Recognition Letters 24, 349–358 (2003)
Cimato, S., De Prisco, R., De Santis, A.: Optimal colored threshold visual cryptography schemes. Designs, Codes and Cryptography 35, 311–335 (2005)
Yang, C.N., Chen, T.S.: Colored visual cryptography scheme based on additive color mixing. Pattern Recognition 41, 3114–3129 (2008)
Ng, F.Y., Wong, D.S.: On the security of a visual cryptography scheme for color images. Pattern Recognition 42, 929–940 (2009)
Chen, L.H., Wu, C.C.: A study on visual cryptography. Master Thesis, National Chiao Tung University, Taiwan (1998)
Wu, H.C., Chang, C.C.: Sharing visual multi-secrets using circle shares. Computer Standards & Interfaces 28, 123–135 (2005)
Shyong, J.S., Huang, S.Y., Lee, Y.K., Wang, R.Z.: Sharing multiple secrets in visual cryptography. Pattern Recognition 40, 3633–3651 (2007)
Hsu, H.C., Chen, T.S., Lin, Y.H.: The ring shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharing. In: Proceedings of the 2004 IEEE International Conference on Networking, Sensing & Control, pp. 996–1001. IEEE Press, New York (2004)
Feng, J.B., Wub, H.C., Tsaic, C.S., Chud, Y.P.: Visual secret sharing for multiple secrets. Pattern Recognition 41, 3572–3581 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Fu, ZX., Yu, B. (2013). On the Security of Multi-secret Visual Cryptography Scheme with Ring Shares. In: Shi, Y.Q., Kim, HJ., Pérez-González, F. (eds) The International Workshop on Digital Forensics and Watermarking 2012. IWDW 2012. Lecture Notes in Computer Science, vol 7809. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40099-5_39
Download citation
DOI: https://doi.org/10.1007/978-3-642-40099-5_39
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40098-8
Online ISBN: 978-3-642-40099-5
eBook Packages: Computer ScienceComputer Science (R0)