{"title":"利用拉丁方防止作弊的可视化密码方案","authors":"Y. Ren, Feng Liu, Teng Guo, Rongquan Feng, D. Lin","doi":"10.1049/iet-ifs.2016.0126","DOIUrl":null,"url":null,"abstract":"In the past decade, the researchers paid more attention to the cheating problem in visual cryptography (VC) so that many cheating prevention visual cryptography schemes (CPVCS) have been proposed. In this paper, the authors propose a novel method, which first makes use of Latin square to prevent cheating in VC. Latin squares are utilised to guide the choosing of authentication regions in different rows and columns of each divided block of the shares, which ensures that the choosing of authentication regions is both random and uniform. Without pixel expansion, the new method provides random regions authentication in each divided block of all shares. What is important is that the proposed method is applicable to both (\n k\n, n\n)-deterministic visual cryptography scheme ((\n k\n, n\n)-DVCS) and (\n k\n, n\n)-probabilistic visual cryptography scheme ((\n k\n, n\n)-PVCS). Experimental results and properties analysis are given to show the effectiveness of the proposed method.","PeriodicalId":13305,"journal":{"name":"IET Inf. Secur.","volume":"16 1","pages":"211-219"},"PeriodicalIF":0.0000,"publicationDate":"2017-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"23","resultStr":"{\"title\":\"Cheating prevention visual cryptography scheme using Latin square\",\"authors\":\"Y. Ren, Feng Liu, Teng Guo, Rongquan Feng, D. Lin\",\"doi\":\"10.1049/iet-ifs.2016.0126\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the past decade, the researchers paid more attention to the cheating problem in visual cryptography (VC) so that many cheating prevention visual cryptography schemes (CPVCS) have been proposed. In this paper, the authors propose a novel method, which first makes use of Latin square to prevent cheating in VC. Latin squares are utilised to guide the choosing of authentication regions in different rows and columns of each divided block of the shares, which ensures that the choosing of authentication regions is both random and uniform. Without pixel expansion, the new method provides random regions authentication in each divided block of all shares. What is important is that the proposed method is applicable to both (\\n k\\n, n\\n)-deterministic visual cryptography scheme ((\\n k\\n, n\\n)-DVCS) and (\\n k\\n, n\\n)-probabilistic visual cryptography scheme ((\\n k\\n, n\\n)-PVCS). Experimental results and properties analysis are given to show the effectiveness of the proposed method.\",\"PeriodicalId\":13305,\"journal\":{\"name\":\"IET Inf. Secur.\",\"volume\":\"16 1\",\"pages\":\"211-219\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-06-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"23\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IET Inf. Secur.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1049/iet-ifs.2016.0126\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Inf. Secur.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1049/iet-ifs.2016.0126","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cheating prevention visual cryptography scheme using Latin square
In the past decade, the researchers paid more attention to the cheating problem in visual cryptography (VC) so that many cheating prevention visual cryptography schemes (CPVCS) have been proposed. In this paper, the authors propose a novel method, which first makes use of Latin square to prevent cheating in VC. Latin squares are utilised to guide the choosing of authentication regions in different rows and columns of each divided block of the shares, which ensures that the choosing of authentication regions is both random and uniform. Without pixel expansion, the new method provides random regions authentication in each divided block of all shares. What is important is that the proposed method is applicable to both (
k
, n
)-deterministic visual cryptography scheme ((
k
, n
)-DVCS) and (
k
, n
)-probabilistic visual cryptography scheme ((
k
, n
)-PVCS). Experimental results and properties analysis are given to show the effectiveness of the proposed method.