On the robustness of visual cryptographic schemes

Sabyasachi Dutta, Partha Sarathi Roy, Avishek Adhikari, Kouichi Sakurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper, we consider the robustness of a special type of secret sharing scheme known as visual cryptographic scheme in which the secret reconstruction is done visually without any mathematical computation unlike other secret sharing schemes. Initially, secret sharing schemes were considered with the presumption that the corrupted participants involved in a protocol behave in a passive manner and submit correct shares during the reconstruction of secret. However, that may not be the case in practical situations. A minimal robust requirement, when a fraction of participants behave maliciously and submit incorrect shares, is that, the set of all shares, some possibly corrupted, can recover the correct secret. Though the concept of robustness is well studied for secret sharing schemes, it is not at all common in the field of visual cryptography. We, for the first time in the literature of visual cryptography, formally define the concept of robustness and put forward (2, n)-threshold visual cryptographic schemes that are robust against deterministic cheating. In the robust secret sharing schemes it is assumed that the number of cheaters is always less than the threshold value so that the original secret is not recovered by the coalition of cheaters only. In the current paper, We consider three different scenarios with respect to the number of cheaters controlled by a centralized adversary. We first consider the existence of only one cheater in a (2, n)-threshold VCS so that the secret image is not recovered by the cheater. Next we consider two different cases, with number of cheaters being greater than 2, with honest majority and without honest majority.

Original languageEnglish
Title of host publicationDigital Forensics and Watermarking - 15th International Workshop, IWDW 2016, Revised Selected Papers
EditorsHyoung Joong Kim, Feng Liu, Fernando Perez-Gonzalez, Yun Qing Shi
PublisherSpringer Verlag
Pages251-262
Number of pages12
ISBN (Print)9783319534640
DOIs
Publication statusPublished - Jan 1 2017
Event15th International Workshop on Digital-Forensics and Watermarking, IWDW 2016 - Beijing, China
Duration: Sep 17 2016Sep 19 2016

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10082 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other15th International Workshop on Digital-Forensics and Watermarking, IWDW 2016
CountryChina
City Beijing
Period9/17/169/19/16

Fingerprint

Secret Sharing Scheme
Cryptography
Robustness
Visual Cryptography
Coalitions
Threshold Value
Vision
Scenarios
Requirements

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Dutta, S., Roy, P. S., Adhikari, A., & Sakurai, K. (2017). On the robustness of visual cryptographic schemes. In H. J. Kim, F. Liu, F. Perez-Gonzalez, & Y. Q. Shi (Eds.), Digital Forensics and Watermarking - 15th International Workshop, IWDW 2016, Revised Selected Papers (pp. 251-262). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 10082 LNCS). Springer Verlag. https://doi.org/10.1007/978-3-319-53465_719

On the robustness of visual cryptographic schemes. / Dutta, Sabyasachi; Roy, Partha Sarathi; Adhikari, Avishek; Sakurai, Kouichi.

Digital Forensics and Watermarking - 15th International Workshop, IWDW 2016, Revised Selected Papers. ed. / Hyoung Joong Kim; Feng Liu; Fernando Perez-Gonzalez; Yun Qing Shi. Springer Verlag, 2017. p. 251-262 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 10082 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Dutta, S, Roy, PS, Adhikari, A & Sakurai, K 2017, On the robustness of visual cryptographic schemes. in HJ Kim, F Liu, F Perez-Gonzalez & YQ Shi (eds), Digital Forensics and Watermarking - 15th International Workshop, IWDW 2016, Revised Selected Papers. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10082 LNCS, Springer Verlag, pp. 251-262, 15th International Workshop on Digital-Forensics and Watermarking, IWDW 2016, Beijing, China, 9/17/16. https://doi.org/10.1007/978-3-319-53465_719
Dutta S, Roy PS, Adhikari A, Sakurai K. On the robustness of visual cryptographic schemes. In Kim HJ, Liu F, Perez-Gonzalez F, Shi YQ, editors, Digital Forensics and Watermarking - 15th International Workshop, IWDW 2016, Revised Selected Papers. Springer Verlag. 2017. p. 251-262. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-319-53465_719
Dutta, Sabyasachi ; Roy, Partha Sarathi ; Adhikari, Avishek ; Sakurai, Kouichi. / On the robustness of visual cryptographic schemes. Digital Forensics and Watermarking - 15th International Workshop, IWDW 2016, Revised Selected Papers. editor / Hyoung Joong Kim ; Feng Liu ; Fernando Perez-Gonzalez ; Yun Qing Shi. Springer Verlag, 2017. pp. 251-262 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{73f20394bf7e485abb296feca6ecedd2,
title = "On the robustness of visual cryptographic schemes",
abstract = "In this paper, we consider the robustness of a special type of secret sharing scheme known as visual cryptographic scheme in which the secret reconstruction is done visually without any mathematical computation unlike other secret sharing schemes. Initially, secret sharing schemes were considered with the presumption that the corrupted participants involved in a protocol behave in a passive manner and submit correct shares during the reconstruction of secret. However, that may not be the case in practical situations. A minimal robust requirement, when a fraction of participants behave maliciously and submit incorrect shares, is that, the set of all shares, some possibly corrupted, can recover the correct secret. Though the concept of robustness is well studied for secret sharing schemes, it is not at all common in the field of visual cryptography. We, for the first time in the literature of visual cryptography, formally define the concept of robustness and put forward (2, n)-threshold visual cryptographic schemes that are robust against deterministic cheating. In the robust secret sharing schemes it is assumed that the number of cheaters is always less than the threshold value so that the original secret is not recovered by the coalition of cheaters only. In the current paper, We consider three different scenarios with respect to the number of cheaters controlled by a centralized adversary. We first consider the existence of only one cheater in a (2, n)-threshold VCS so that the secret image is not recovered by the cheater. Next we consider two different cases, with number of cheaters being greater than 2, with honest majority and without honest majority.",
author = "Sabyasachi Dutta and Roy, {Partha Sarathi} and Avishek Adhikari and Kouichi Sakurai",
year = "2017",
month = "1",
day = "1",
doi = "10.1007/978-3-319-53465_719",
language = "English",
isbn = "9783319534640",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "251--262",
editor = "Kim, {Hyoung Joong} and Feng Liu and Fernando Perez-Gonzalez and Shi, {Yun Qing}",
booktitle = "Digital Forensics and Watermarking - 15th International Workshop, IWDW 2016, Revised Selected Papers",
address = "Germany",

}

TY - GEN

T1 - On the robustness of visual cryptographic schemes

AU - Dutta, Sabyasachi

AU - Roy, Partha Sarathi

AU - Adhikari, Avishek

AU - Sakurai, Kouichi

PY - 2017/1/1

Y1 - 2017/1/1

N2 - In this paper, we consider the robustness of a special type of secret sharing scheme known as visual cryptographic scheme in which the secret reconstruction is done visually without any mathematical computation unlike other secret sharing schemes. Initially, secret sharing schemes were considered with the presumption that the corrupted participants involved in a protocol behave in a passive manner and submit correct shares during the reconstruction of secret. However, that may not be the case in practical situations. A minimal robust requirement, when a fraction of participants behave maliciously and submit incorrect shares, is that, the set of all shares, some possibly corrupted, can recover the correct secret. Though the concept of robustness is well studied for secret sharing schemes, it is not at all common in the field of visual cryptography. We, for the first time in the literature of visual cryptography, formally define the concept of robustness and put forward (2, n)-threshold visual cryptographic schemes that are robust against deterministic cheating. In the robust secret sharing schemes it is assumed that the number of cheaters is always less than the threshold value so that the original secret is not recovered by the coalition of cheaters only. In the current paper, We consider three different scenarios with respect to the number of cheaters controlled by a centralized adversary. We first consider the existence of only one cheater in a (2, n)-threshold VCS so that the secret image is not recovered by the cheater. Next we consider two different cases, with number of cheaters being greater than 2, with honest majority and without honest majority.

AB - In this paper, we consider the robustness of a special type of secret sharing scheme known as visual cryptographic scheme in which the secret reconstruction is done visually without any mathematical computation unlike other secret sharing schemes. Initially, secret sharing schemes were considered with the presumption that the corrupted participants involved in a protocol behave in a passive manner and submit correct shares during the reconstruction of secret. However, that may not be the case in practical situations. A minimal robust requirement, when a fraction of participants behave maliciously and submit incorrect shares, is that, the set of all shares, some possibly corrupted, can recover the correct secret. Though the concept of robustness is well studied for secret sharing schemes, it is not at all common in the field of visual cryptography. We, for the first time in the literature of visual cryptography, formally define the concept of robustness and put forward (2, n)-threshold visual cryptographic schemes that are robust against deterministic cheating. In the robust secret sharing schemes it is assumed that the number of cheaters is always less than the threshold value so that the original secret is not recovered by the coalition of cheaters only. In the current paper, We consider three different scenarios with respect to the number of cheaters controlled by a centralized adversary. We first consider the existence of only one cheater in a (2, n)-threshold VCS so that the secret image is not recovered by the cheater. Next we consider two different cases, with number of cheaters being greater than 2, with honest majority and without honest majority.

UR - http://www.scopus.com/inward/record.url?scp=85013436530&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85013436530&partnerID=8YFLogxK

U2 - 10.1007/978-3-319-53465_719

DO - 10.1007/978-3-319-53465_719

M3 - Conference contribution

AN - SCOPUS:85013436530

SN - 9783319534640

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 251

EP - 262

BT - Digital Forensics and Watermarking - 15th International Workshop, IWDW 2016, Revised Selected Papers

A2 - Kim, Hyoung Joong

A2 - Liu, Feng

A2 - Perez-Gonzalez, Fernando

A2 - Shi, Yun Qing

PB - Springer Verlag

ER -