Publication Type:

Journal Article


Advances in Intelligent Systems and Computing, Springer Verlag, Volume 563, p.257-265 (2018)





Authentication, Cheating immune, Cheating preventions, Cryptographic schemes, Cryptography, Expansion, Intelligent computing, Malicious adversaries, Pixel expansion, Pixels, Secret sharing, Visual cryptography


<p>One of the drawbacks in visual cryptography is cheating attacks, where the malicious adversaries can cheat the honest participant by submitting fake shares during reconstruction phase. Cheating immune visual cryptographic schemes are used for mitigating cheating attacks in visual cryptography. There are two types of cheating immune schemes: One is share authentication-based schemes, and the other is blind authentication-based schemes. For the existing blind authentication-based schemes, the pixel expansion value will increase in the order of O(n). In this paper, a blind authentication-based cheating immune visual cryptographic scheme is proposed by modifying the existing scheme based on uniform codes where the pixel expansion value will increase in the order of O(log n). © 2018, Springer Nature Singapore Pte Ltd.</p>


cited By 0; Conference of International Conference on Advanced Computing and Intelligent Engineering, ICACIE 2016 ; Conference Date: 23 December 2016 Through 25 December 2016; Conference Code:208989

Cite this Research Publication

K. Praveen and Sethumadhavan, M., “Cheating Immune Visual Cryptographic Scheme with Reduced Pixel Expansion”, Advances in Intelligent Systems and Computing, vol. 563, pp. 257-265, 2018.