loading
  • Login
  • Sign-Up

Research.Publish.Connect.

Paper

Authors: Ching-Nung Yang 1 ; Stelvio Cimato 2 ; Jihi-Han Wu 1 and Song-Ruei Cai 1

Affiliations: 1 National Dong Hwa University, Taiwan ; 2 Università degli studi di Milano, Italy

ISBN: 978-989-758-167-0

Keyword(s): Visual Cryptography, Cheating, Deterministic Cheating, Cheating Prevention.

Related Ontology Subjects/Areas/Topics: Information and Systems Security ; Information Assurance ; Information Hiding

Abstract: In literature, (2, n) cheating prevention visual cryptographic schemes (CPVCSs) have been proposed, dealing with the case of dishonest participants, called cheaters, who can collude together to force honest participants to reconstruct a wrong secret. While (2, n)-CPVCSs resistant to deterministic cheating have been presented, the problem of defining (k, n)-CPVCS for any k has not been solved. In this paper, we discuss (3, n)-CPVCS, and propose three (3, n)-CPVCSs with different cheating prevention capabilities. To show the effectiveness of the presented (3, n)-CPVCS, some experimental results are discussed as well.

PDF ImageFull Text

Download
Sign In Guest: Register as new SCITEPRESS user or Join INSTICC now for free.

Sign In SCITEPRESS user: please login.

Sign In INSTICC Members: please login. If not a member yet, Join INSTICC now for free.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 54.196.108.20. INSTICC members have higher download limits (free membership now)

In the current month:
Recent papers: 1 available of 1 total
2+ years older papers: 2 available of 2 total

Paper citation in several formats:
Yang C., Cimato S., Wu J. and Cai S. (2016). 3-Out-of-n Cheating Prevention Visual Cryptographic Schemes.In Proceedings of the 2nd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-167-0, pages 400-406. DOI: 10.5220/0005740504000406

@conference{icissp16,
author={Ching-Nung Yang and Stelvio Cimato and Jihi-Han Wu and Song-Ruei Cai},
title={3-Out-of-n Cheating Prevention Visual Cryptographic Schemes},
booktitle={Proceedings of the 2nd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2016},
pages={400-406},
doi={10.5220/0005740504000406},
isbn={978-989-758-167-0},
}

TY - CONF

JO - Proceedings of the 2nd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - 3-Out-of-n Cheating Prevention Visual Cryptographic Schemes
SN - 978-989-758-167-0
AU - Yang C.
AU - Cimato S.
AU - Wu J.
AU - Cai S.
PY - 2016
SP - 400
EP - 406
DO - 10.5220/0005740504000406

Sorted by: Show papers

Note: The preferred Subjects/Areas/Topics, listed below for each paper, are those that match the selected paper topics and their ontology superclasses.
More...

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.

Show authors

Note: The preferred Subjects/Areas/Topics, listed below for each author, are those that more frequently used in the author's papers.
More...