a new cheating prevention scheme for visual cryptography.ppt

14
A New Cheating Prevention Scheme For Visual Cryptography 第第第第第第第第第第第第 Jun 8 2006 Du-Shiau Tsai ab ,Tzung-her Chen c and Gwoboa Horng a a Department of Computer Science, National Chung Hsing Un iversity b Department of Information Management, Hsiuping institue of Technology c Department of Computer Science and Information Engineer ing, National Chiayi University 第第第 第第第

Upload: gladyglad

Post on 08-Nov-2014

46 views

Category:

Documents


2 download

DESCRIPTION

A New Cheating Prevention Scheme

TRANSCRIPT

Page 1: A New Cheating Prevention Scheme For Visual Cryptography.ppt

A New Cheating Prevention Scheme For Visual Cryptography

第十六屆全國資訊安全會議Jun 8 2006

Du-Shiau Tsaiab,Tzung-her Chenc and Gwoboa Hornga

aDepartment of Computer Science, National Chung Hsing UniversitybDepartment of Information Management, Hsiuping institue of Technology

cDepartment of Computer Science and Information Engineering, National Chiayi University報告人:張淯閎

Page 2: A New Cheating Prevention Scheme For Visual Cryptography.ppt

2

Conspectus Abstract Visual Cryptography Cheating in Visual Cryptography VC Cheating Protection Scheme Simulated Results Conclusion

Page 3: A New Cheating Prevention Scheme For Visual Cryptography.ppt

3

Abstract Naor and Shamir proposed the (k,n) Visual Cr

yptography(VC for short) scheme in 1995, and has been used in numerous applications.

In 2006, Horng et al. proposed that cheating is possible in VC.

In this study, a new scheme used Generic Algorithms(GA for short) is proposed to solve the cheating problem.

Page 4: A New Cheating Prevention Scheme For Visual Cryptography.ppt

4

Visual Cryptography The nm subpixels is described as an n×m boolean matrix S=[S

ij] such that Sij = 1 if and only if the jth subpixel of the ith share is black. A solution to the (k,n) VC scheme consists of two collections of n×m boolean matrices C0(For white) and C1(For black).

The solution is considered valid if the following three conditions are met:1.H(V) ≦ d-α*m in C0

2.H(V) ≧ d in C1 3.For any subset {i1,i2,…,iq} of {1,2,…,n} with q < k, the two collections of q×m matrices Dt for tε{0,1} obtained by restricting each n×m matrix in Ct (where t=0,1) to rows i1,i2,…,iq are indistinguishable in the sense that they contain the same matrices with the same frequencies.

Page 5: A New Cheating Prevention Scheme For Visual Cryptography.ppt

5

Cheating in Visual Cryptography Horng et al. proposed that cheating is possible

in (k,n) VC when k is smaller than n. The key point of cheating is how to predict an

d rearrange the positions of black and white subpixels in the victim’s and cheater’s share.

Figure 1. shows the whole cheating process and Table 1. shows the cheaters create to change the decoded image.

Page 6: A New Cheating Prevention Scheme For Visual Cryptography.ppt

Figure 1.: the cheating process

Page 7: A New Cheating Prevention Scheme For Visual Cryptography.ppt

Pixel in

Secret

Image

Share pixel in Share SA

Share pixel in Share SB

Share pixel in Share SC

Pixel in

Cheating

Image

Share pixel in

Share SA’

Share pixel in

Share SB’

Case1 white [1 0 0] [1 0 0] [1 0 0] white [1 0 0] [1 0 0]

Case2 white [1 0 0] [1 0 0] [1 0 0] black [0 1 0] [0 0 1]

Case3 black [1 0 0] [0 1 0] [0 0 1] white [0 0 1] [0 0 1]

Case4 black [1 0 0] [0 1 0] [0 0 1] black [1 0 0] [0 1 0]

Table 1.: The concept of cheating in VC

Page 8: A New Cheating Prevention Scheme For Visual Cryptography.ppt

8

VC Cheating Protection Scheme(1) Figure 2. shows the process to proposed scheme.

●First, The rotation process turns SI with different degrees of angle to generate SI. ●Second, used GA to proposed scheme.

2

nC

Figure 2. The sketch of proposed scheme

Page 9: A New Cheating Prevention Scheme For Visual Cryptography.ppt

9

VC Cheating Protection Scheme(2)Individual 1Individual 2Individual 3

...

Fitness Function

Transmutation stop yes or no?

Reproduction Crossover Mutation

Population

Simulation environment

MatingPool

New generation

Figure 3.GA Process

Page 10: A New Cheating Prevention Scheme For Visual Cryptography.ppt

10

VC Cheating Protection Scheme(3)

Figure 4. The chromosomes

Page 11: A New Cheating Prevention Scheme For Visual Cryptography.ppt

11

VC Cheating Protection Scheme(4)IF H(V j) = EV THEN

ρ j= 1 ELSEρ j = 0, where j = 1,2,…,n

IF H(g(i1 ,i2 ) ) satisfy SV (i1 ,i2 ) THEN

ψ(i1 ,i2 ) = 1 else ψ(i1 ,i2 ) = 0, where i 1 < i 2 < n

fitness value =

2

1*

),( 21

njii

Fitness function algorithm

Page 12: A New Cheating Prevention Scheme For Visual Cryptography.ppt

12

Simulated Results(1)

Figure 5. Decoded images in the (2, 4) cheating prevention scheme

Page 13: A New Cheating Prevention Scheme For Visual Cryptography.ppt

13

Simulated Results(2)

Figure 7: Results of simulated cheating attack.

Page 14: A New Cheating Prevention Scheme For Visual Cryptography.ppt

14

Conclusion The proposed scheme does against the

cheating attack in VC. The GA based share construction method

provides another direction for creating shares.