Tagged visual cryptography with access control

Yi Hui Chen, Chi Shiang Chan, Po Yu Hsu, Wei Lin Huang

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

Visual cryptography is a way to encrypt the secret image into several meaningless share images. Noted that no information can be obtained if not all of the shares are collected. Stacking the share images, the secret image can be retrieved. The share images are meaningless to owner which results in difficult to manage. Tagged visual cryptography is a skill to print a pattern onto meaningless share images. After that, users can easily manage their own share images according to the printed pattern. Besides, access control is another popular topic to allow a user or a group to see the own authorizations. In this paper, a self-authentication mechanism with lossless construction ability for image secret sharing scheme is proposed. The experiments provide the positive data to show the feasibility of the proposed scheme.

Original languageEnglish
Title of host publication2014 IEEE International Conference on Multimedia and Expo Workshops, ICMEW 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781479947171
DOIs
StatePublished - 03 09 2014
Externally publishedYes
Event2014 IEEE International Conference on Multimedia and Expo Workshops, ICMEW 2014 - Chengdu, China
Duration: 14 07 201418 07 2014

Publication series

Name2014 IEEE International Conference on Multimedia and Expo Workshops, ICMEW 2014

Conference

Conference2014 IEEE International Conference on Multimedia and Expo Workshops, ICMEW 2014
Country/TerritoryChina
CityChengdu
Period14/07/1418/07/14

Bibliographical note

Publisher Copyright:
© 2014 IEEE.

Keywords

  • Visual cryptography
  • access control
  • secret sharing
  • tagged visual cryptography

Fingerprint

Dive into the research topics of 'Tagged visual cryptography with access control'. Together they form a unique fingerprint.

Cite this