CFP last date
22 April 2024
Reseach Article

A Survey on Cheating Prevention with Verifiable Scheme

by Priya Venny, Jyoti Rao
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 133 - Number 16
Year of Publication: 2016
Authors: Priya Venny, Jyoti Rao
10.5120/ijca2016908159

Priya Venny, Jyoti Rao . A Survey on Cheating Prevention with Verifiable Scheme. International Journal of Computer Applications. 133, 16 ( January 2016), 21-24. DOI=10.5120/ijca2016908159

@article{ 10.5120/ijca2016908159,
author = { Priya Venny, Jyoti Rao },
title = { A Survey on Cheating Prevention with Verifiable Scheme },
journal = { International Journal of Computer Applications },
issue_date = { January 2016 },
volume = { 133 },
number = { 16 },
month = { January },
year = { 2016 },
issn = { 0975-8887 },
pages = { 21-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume133/number16/23872-2016908159/ },
doi = { 10.5120/ijca2016908159 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:31:27.086971+05:30
%A Priya Venny
%A Jyoti Rao
%T A Survey on Cheating Prevention with Verifiable Scheme
%J International Journal of Computer Applications
%@ 0975-8887
%V 133
%N 16
%P 21-24
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Visual Cryptographic technique has become an important field of study in modern cryptography. Visual cryptography (VC) has quite a few applications and some of them are authentication and identification, steganography, and image encryption. As the era demands the need of security and Visual Secret Sharing to resist cheating scenario is a Visual Cryptographic technique. VSS is simple as it is easily detectable by human visual system. A secret image sharing scheme is used for identifying the existence of cheater. The use of verifiable scheme leads helps find the presence of a cheater. The problem of cheating prevention exists and researchers have proposed scheme like Cheating-prevention visual secret-sharing (CPVSS) schemes. This paper is based on the study of the cheating prevention happening in Visual Cryptography.

References
  1. M. Naor And A. Shamir, “Visual Cryptography,” In Advances In Cryptology, Vol. 950. New York, Ny, Usa: Springer-Verlag, 1995, Pp. 1–12.
  2. Kai-Hui Lee , Pei-Ling Chiu, “Digital Image Sharing by Diverse Image media”,IEEE Transactions on Information Forensics and Security, vol 9, No. 1,pp.88-98,January 2014. Ding, W. and Marchionini, G. 1997 A Study on Video Browsing Strategies. Technical Report. University of Maryland at College Park.
  3. Tan, Xiaoqing, and Qiong Zhang. "A Kind of Verifiable Visual Cryptography Scheme." Emerging Intelligent Data and Web Technologies (EIDWT), 2013 Fourth International Conference on. IEEE, 2013.
  4. Chen, Yu-Chi, Du-Shiau Tsai, and Gwoboa Horng. "Visual secret sharing with cheating prevention revisited." Digital Signal Processing 23.5 (2013): 1496-1504.
  5. Horng, Gwoboa, Tzungher Chen, and Du-Shiau Tsai. "Cheating in visual cryptography." Designs, Codes and Cryptography 38.2 (2006): 219-236.
  6. Patil, Smita, and Jyoti Rao. "Survey of Cheating Prevention Techniques in Visual Cryptography." International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064..
  7. Hu, Chih-Ming, and Wen-Guey Tzeng. "Cheating prevention in visual cryptography." Image Processing, IEEE Transactions on 16.1 (2007): 36-45.
  8. Chen, Yu-Chi, Gwoboa Horng, and Du-Shiau Tsai. "Comment on “cheating prevention in visual cryptography”." Image Processing, IEEE Transactions on 21.7 (2012): 3319-3323.
  9. Rose, A. Angel, and Sabu M. Thampi. "A Secure Verifiable Scheme for Secret Image Sharing." Procedia Computer Science 58 (2015): 140-150.
  10. Jana, Biswabandhu, et al. "Cheating prevention in Visual Cryptography using steganographic scheme." Issues and Challenges in Intelligent Computing Techniques (ICICT), 2014 International Conference on. IEEE, 2014.
  11. Chen, Qin, et al. "An (n, n) threshold Visual Cryptography Scheme for Cheating prevention." Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on. Vol. 8. IEEE, 2010.
  12. Mostaghim, Melika, and Reza Boostani. "CVC: Chaotic visual cryptography to enhance steganography." Information Security and Cryptology (ISCISC), 2014 11th International ISC Conference on. IEEE, 2014.
  13. Jana, Biswabandhu, et al. "Cheating prevention in Visual Cryptographic Schemes using message embedding: A hardware based practical approach."Issues and Challenges in Intelligent Computing Techniques (ICICT), 2014 International Conference on. IEEE, 2014.
Index Terms

Computer Science
Information Sciences

Keywords

Cheaters Cheating Prevention Cheating Activity Visual Secret Sharing (VSS).