Design a new visual cryptography for human-verifiable authentication in accessing a database View Full Text


Ontology type: schema:ScholarlyArticle     


Article Info

DATE

2015-06-13

AUTHORS

Ching-Nung Yang, Li-Zhe Sun, Xuehu Yan, Cheonshik Kim

ABSTRACT

Visual cryptographic scheme (VCS) has an attractive property of decoding that can be performed directly by the human visual system without any computation. This novel stacking-to-see property of VCS can be secure and cheap used for visual authentication in accessing a data base. In this paper, we design a new participant-specific VCS (PSVCS) to extend the authentication scenario from a single-client authentication in VCS-based authentication schemes to a group of clients with specific threshold property. The proposed (t,k,n\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$t, k, n$$\end{document})-PSVCS, where t≤k≤n\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$t\, \le \,k \,\le\, n$$\end{document}, needs t\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$t$$\end{document} specific participants and other (k-t\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$k-t$$\end{document}) participants to decode the secret image. When compared with previous VCS-based authentication schemes, our PSVCS-based authentication can provide different privileges to clients and is more suitable for real environment. More... »

PAGES

483-494

References to SciGraph publications

  • 2008-07-10. The alignment problem of visual cryptography schemes in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2012-04-21. Aspect ratio invariant visual cryptography by image filtering and resizing in PERSONAL AND UBIQUITOUS COMPUTING
  • 1997. Visual authentication and identification in ADVANCES IN CRYPTOLOGY — CRYPTO '97
  • 1995. Visual cryptography in ADVANCES IN CRYPTOLOGY — EUROCRYPT'94
  • 2010. A Comprehensive Study of Visual Cryptography in TRANSACTIONS ON DATA HIDING AND MULTIMEDIA SECURITY V
  • Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/s11554-015-0511-9

    DOI

    http://dx.doi.org/10.1007/s11554-015-0511-9

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1018383357


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Data Format", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "Department of CSIE, National Dong Hwa University, Hualien, Taiwan", 
              "id": "http://www.grid.ac/institutes/grid.260567.0", 
              "name": [
                "Department of CSIE, National Dong Hwa University, Hualien, Taiwan"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Yang", 
            "givenName": "Ching-Nung", 
            "id": "sg:person.012350400311.86", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012350400311.86"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Department of CSIE, National Dong Hwa University, Hualien, Taiwan", 
              "id": "http://www.grid.ac/institutes/grid.260567.0", 
              "name": [
                "Department of CSIE, National Dong Hwa University, Hualien, Taiwan"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Sun", 
            "givenName": "Li-Zhe", 
            "id": "sg:person.011123336767.55", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011123336767.55"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China", 
              "id": "http://www.grid.ac/institutes/grid.19373.3f", 
              "name": [
                "School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Yan", 
            "givenName": "Xuehu", 
            "id": "sg:person.010467364517.31", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010467364517.31"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Department of Digital Media Engineering, Anyang University, Anyang-si, Gyeonggi-do, Korea", 
              "id": "http://www.grid.ac/institutes/grid.443830.8", 
              "name": [
                "Department of Digital Media Engineering, Anyang University, Anyang-si, Gyeonggi-do, Korea"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Kim", 
            "givenName": "Cheonshik", 
            "id": "sg:person.010020741525.63", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010020741525.63"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/bfb0053419", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1008839066", 
              "https://doi.org/10.1007/bfb0053419"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/bfb0052245", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1025446405", 
              "https://doi.org/10.1007/bfb0052245"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-14298-7_5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1050017989", 
              "https://doi.org/10.1007/978-3-642-14298-7_5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s10623-008-9225-3", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1038061355", 
              "https://doi.org/10.1007/s10623-008-9225-3"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s00779-012-0535-0", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1008313697", 
              "https://doi.org/10.1007/s00779-012-0535-0"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2015-06-13", 
        "datePublishedReg": "2015-06-13", 
        "description": "Visual cryptographic scheme (VCS) has an attractive property of decoding that can be performed directly by the human visual system without any computation. This novel stacking-to-see property of VCS can be secure and cheap\u00a0used for visual authentication in accessing a data base. In this paper, we design a new participant-specific VCS (PSVCS) to extend the authentication scenario from a single-client authentication in VCS-based authentication schemes to a group of clients with specific threshold property. The proposed (t,k,n\\documentclass[12pt]{minimal}\n\t\t\t\t\\usepackage{amsmath}\n\t\t\t\t\\usepackage{wasysym}\n\t\t\t\t\\usepackage{amsfonts}\n\t\t\t\t\\usepackage{amssymb}\n\t\t\t\t\\usepackage{amsbsy}\n\t\t\t\t\\usepackage{mathrsfs}\n\t\t\t\t\\usepackage{upgreek}\n\t\t\t\t\\setlength{\\oddsidemargin}{-69pt}\n\t\t\t\t\\begin{document}$$t, k, n$$\\end{document})-PSVCS, where t\u2264k\u2264n\\documentclass[12pt]{minimal}\n\t\t\t\t\\usepackage{amsmath}\n\t\t\t\t\\usepackage{wasysym}\n\t\t\t\t\\usepackage{amsfonts}\n\t\t\t\t\\usepackage{amssymb}\n\t\t\t\t\\usepackage{amsbsy}\n\t\t\t\t\\usepackage{mathrsfs}\n\t\t\t\t\\usepackage{upgreek}\n\t\t\t\t\\setlength{\\oddsidemargin}{-69pt}\n\t\t\t\t\\begin{document}$$t\\, \\le \\,k \\,\\le\\, n$$\\end{document}, needs t\\documentclass[12pt]{minimal}\n\t\t\t\t\\usepackage{amsmath}\n\t\t\t\t\\usepackage{wasysym}\n\t\t\t\t\\usepackage{amsfonts}\n\t\t\t\t\\usepackage{amssymb}\n\t\t\t\t\\usepackage{amsbsy}\n\t\t\t\t\\usepackage{mathrsfs}\n\t\t\t\t\\usepackage{upgreek}\n\t\t\t\t\\setlength{\\oddsidemargin}{-69pt}\n\t\t\t\t\\begin{document}$$t$$\\end{document} specific participants and other (k-t\\documentclass[12pt]{minimal}\n\t\t\t\t\\usepackage{amsmath}\n\t\t\t\t\\usepackage{wasysym}\n\t\t\t\t\\usepackage{amsfonts}\n\t\t\t\t\\usepackage{amssymb}\n\t\t\t\t\\usepackage{amsbsy}\n\t\t\t\t\\usepackage{mathrsfs}\n\t\t\t\t\\usepackage{upgreek}\n\t\t\t\t\\setlength{\\oddsidemargin}{-69pt}\n\t\t\t\t\\begin{document}$$k-t$$\\end{document}) participants to decode the secret image. When compared with previous VCS-based authentication schemes, our PSVCS-based authentication can provide different privileges to clients and is more suitable for real environment.", 
        "genre": "article", 
        "id": "sg:pub.10.1007/s11554-015-0511-9", 
        "isAccessibleForFree": false, 
        "isPartOf": [
          {
            "id": "sg:journal.1136113", 
            "issn": [
              "1861-8200", 
              "1861-8219"
            ], 
            "name": "Journal of Real-Time Image Processing", 
            "publisher": "Springer Nature", 
            "type": "Periodical"
          }, 
          {
            "issueNumber": "2", 
            "type": "PublicationIssue"
          }, 
          {
            "type": "PublicationVolume", 
            "volumeNumber": "12"
          }
        ], 
        "keywords": [
          "visual cryptographic scheme", 
          "authentication scheme", 
          "new visual cryptography", 
          "human visual system", 
          "visual cryptography", 
          "secret image", 
          "authentication scenarios", 
          "cryptographic schemes", 
          "different privileges", 
          "visual authentication", 
          "real environment", 
          "authentication", 
          "group of clients", 
          "scheme", 
          "visual system", 
          "data base", 
          "clients", 
          "cryptography", 
          "decoding", 
          "computation", 
          "specific participants", 
          "images", 
          "scenarios", 
          "database", 
          "threshold properties", 
          "attractive properties", 
          "environment", 
          "system", 
          "privilege", 
          "base", 
          "participants", 
          "properties", 
          "group", 
          "paper"
        ], 
        "name": "Design a new visual cryptography for human-verifiable authentication in accessing a database", 
        "pagination": "483-494", 
        "productId": [
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1018383357"
            ]
          }, 
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/s11554-015-0511-9"
            ]
          }
        ], 
        "sameAs": [
          "https://doi.org/10.1007/s11554-015-0511-9", 
          "https://app.dimensions.ai/details/publication/pub.1018383357"
        ], 
        "sdDataset": "articles", 
        "sdDatePublished": "2022-12-01T06:33", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-springernature-scigraph/baseset/20221201/entities/gbq_results/article/article_660.jsonl", 
        "type": "ScholarlyArticle", 
        "url": "https://doi.org/10.1007/s11554-015-0511-9"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s11554-015-0511-9'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s11554-015-0511-9'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s11554-015-0511-9'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s11554-015-0511-9'


     

    This table displays all metadata directly associated to this object as RDF triples.

    138 TRIPLES      21 PREDICATES      63 URIs      50 LITERALS      6 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/s11554-015-0511-9 schema:about anzsrc-for:08
    2 anzsrc-for:0804
    3 schema:author N1d1035b612bb4a88aa1677046c4c4b71
    4 schema:citation sg:pub.10.1007/978-3-642-14298-7_5
    5 sg:pub.10.1007/bfb0052245
    6 sg:pub.10.1007/bfb0053419
    7 sg:pub.10.1007/s00779-012-0535-0
    8 sg:pub.10.1007/s10623-008-9225-3
    9 schema:datePublished 2015-06-13
    10 schema:datePublishedReg 2015-06-13
    11 schema:description Visual cryptographic scheme (VCS) has an attractive property of decoding that can be performed directly by the human visual system without any computation. This novel stacking-to-see property of VCS can be secure and cheap used for visual authentication in accessing a data base. In this paper, we design a new participant-specific VCS (PSVCS) to extend the authentication scenario from a single-client authentication in VCS-based authentication schemes to a group of clients with specific threshold property. The proposed (t,k,n\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$t, k, n$$\end{document})-PSVCS, where t≤k≤n\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$t\, \le \,k \,\le\, n$$\end{document}, needs t\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$t$$\end{document} specific participants and other (k-t\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$k-t$$\end{document}) participants to decode the secret image. When compared with previous VCS-based authentication schemes, our PSVCS-based authentication can provide different privileges to clients and is more suitable for real environment.
    12 schema:genre article
    13 schema:isAccessibleForFree false
    14 schema:isPartOf N04b1ae7ddcda47dbb5d625a4259ed220
    15 N60b8a7776e554bc1a40605bb92531529
    16 sg:journal.1136113
    17 schema:keywords attractive properties
    18 authentication
    19 authentication scenarios
    20 authentication scheme
    21 base
    22 clients
    23 computation
    24 cryptographic schemes
    25 cryptography
    26 data base
    27 database
    28 decoding
    29 different privileges
    30 environment
    31 group
    32 group of clients
    33 human visual system
    34 images
    35 new visual cryptography
    36 paper
    37 participants
    38 privilege
    39 properties
    40 real environment
    41 scenarios
    42 scheme
    43 secret image
    44 specific participants
    45 system
    46 threshold properties
    47 visual authentication
    48 visual cryptographic scheme
    49 visual cryptography
    50 visual system
    51 schema:name Design a new visual cryptography for human-verifiable authentication in accessing a database
    52 schema:pagination 483-494
    53 schema:productId N9ef8ef15cadc436b8a659c118798a1ae
    54 Nd4002ae083fe43e7a17d14a94e0cef0e
    55 schema:sameAs https://app.dimensions.ai/details/publication/pub.1018383357
    56 https://doi.org/10.1007/s11554-015-0511-9
    57 schema:sdDatePublished 2022-12-01T06:33
    58 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    59 schema:sdPublisher N52f2f95035fb41b7bc99b7944e564016
    60 schema:url https://doi.org/10.1007/s11554-015-0511-9
    61 sgo:license sg:explorer/license/
    62 sgo:sdDataset articles
    63 rdf:type schema:ScholarlyArticle
    64 N04b1ae7ddcda47dbb5d625a4259ed220 schema:issueNumber 2
    65 rdf:type schema:PublicationIssue
    66 N1d1035b612bb4a88aa1677046c4c4b71 rdf:first sg:person.012350400311.86
    67 rdf:rest Na2ebbe7b0a874178a614f4e885d7d07b
    68 N2a92a402fa254b63b0cd2ac18e95b522 rdf:first sg:person.010020741525.63
    69 rdf:rest rdf:nil
    70 N52f2f95035fb41b7bc99b7944e564016 schema:name Springer Nature - SN SciGraph project
    71 rdf:type schema:Organization
    72 N60b8a7776e554bc1a40605bb92531529 schema:volumeNumber 12
    73 rdf:type schema:PublicationVolume
    74 N6bb8e147906846e58ea3d35151a13ca1 rdf:first sg:person.010467364517.31
    75 rdf:rest N2a92a402fa254b63b0cd2ac18e95b522
    76 N9ef8ef15cadc436b8a659c118798a1ae schema:name dimensions_id
    77 schema:value pub.1018383357
    78 rdf:type schema:PropertyValue
    79 Na2ebbe7b0a874178a614f4e885d7d07b rdf:first sg:person.011123336767.55
    80 rdf:rest N6bb8e147906846e58ea3d35151a13ca1
    81 Nd4002ae083fe43e7a17d14a94e0cef0e schema:name doi
    82 schema:value 10.1007/s11554-015-0511-9
    83 rdf:type schema:PropertyValue
    84 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    85 schema:name Information and Computing Sciences
    86 rdf:type schema:DefinedTerm
    87 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
    88 schema:name Data Format
    89 rdf:type schema:DefinedTerm
    90 sg:journal.1136113 schema:issn 1861-8200
    91 1861-8219
    92 schema:name Journal of Real-Time Image Processing
    93 schema:publisher Springer Nature
    94 rdf:type schema:Periodical
    95 sg:person.010020741525.63 schema:affiliation grid-institutes:grid.443830.8
    96 schema:familyName Kim
    97 schema:givenName Cheonshik
    98 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010020741525.63
    99 rdf:type schema:Person
    100 sg:person.010467364517.31 schema:affiliation grid-institutes:grid.19373.3f
    101 schema:familyName Yan
    102 schema:givenName Xuehu
    103 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010467364517.31
    104 rdf:type schema:Person
    105 sg:person.011123336767.55 schema:affiliation grid-institutes:grid.260567.0
    106 schema:familyName Sun
    107 schema:givenName Li-Zhe
    108 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011123336767.55
    109 rdf:type schema:Person
    110 sg:person.012350400311.86 schema:affiliation grid-institutes:grid.260567.0
    111 schema:familyName Yang
    112 schema:givenName Ching-Nung
    113 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012350400311.86
    114 rdf:type schema:Person
    115 sg:pub.10.1007/978-3-642-14298-7_5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1050017989
    116 https://doi.org/10.1007/978-3-642-14298-7_5
    117 rdf:type schema:CreativeWork
    118 sg:pub.10.1007/bfb0052245 schema:sameAs https://app.dimensions.ai/details/publication/pub.1025446405
    119 https://doi.org/10.1007/bfb0052245
    120 rdf:type schema:CreativeWork
    121 sg:pub.10.1007/bfb0053419 schema:sameAs https://app.dimensions.ai/details/publication/pub.1008839066
    122 https://doi.org/10.1007/bfb0053419
    123 rdf:type schema:CreativeWork
    124 sg:pub.10.1007/s00779-012-0535-0 schema:sameAs https://app.dimensions.ai/details/publication/pub.1008313697
    125 https://doi.org/10.1007/s00779-012-0535-0
    126 rdf:type schema:CreativeWork
    127 sg:pub.10.1007/s10623-008-9225-3 schema:sameAs https://app.dimensions.ai/details/publication/pub.1038061355
    128 https://doi.org/10.1007/s10623-008-9225-3
    129 rdf:type schema:CreativeWork
    130 grid-institutes:grid.19373.3f schema:alternateName School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China
    131 schema:name School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China
    132 rdf:type schema:Organization
    133 grid-institutes:grid.260567.0 schema:alternateName Department of CSIE, National Dong Hwa University, Hualien, Taiwan
    134 schema:name Department of CSIE, National Dong Hwa University, Hualien, Taiwan
    135 rdf:type schema:Organization
    136 grid-institutes:grid.443830.8 schema:alternateName Department of Digital Media Engineering, Anyang University, Anyang-si, Gyeonggi-do, Korea
    137 schema:name Department of Digital Media Engineering, Anyang University, Anyang-si, Gyeonggi-do, Korea
    138 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...