Call for Paper - March 2023 Edition
IJCA solicits original research papers for the March 2023 Edition. Last date of manuscript submission is February 20, 2023. Read More

A Survey on Cheating Prevention with Verifiable Scheme

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Authors:
Priya Venny, Jyoti Rao
10.5120/ijca2016908159

Priya Venny and Jyoti Rao. Article: A Survey on Cheating Prevention with Verifiable Scheme. International Journal of Computer Applications 133(16):21-24, January 2016. Published by Foundation of Computer Science (FCS), NY, USA. BibTeX

@article{key:article,
	author = {Priya Venny and Jyoti Rao},
	title = {Article: A Survey on Cheating Prevention with Verifiable Scheme},
	journal = {International Journal of Computer Applications},
	year = {2016},
	volume = {133},
	number = {16},
	pages = {21-24},
	month = {January},
	note = {Published by Foundation of Computer Science (FCS), NY, USA}
}

Abstract

Visual Cryptographic technique has become an important field of study in modern cryptography. Visual cryptography (VC) has quite a few applications and some of them are authentication and identification, steganography, and image encryption. As the era demands the need of security and Visual Secret Sharing to resist cheating scenario is a Visual Cryptographic technique. VSS is simple as it is easily detectable by human visual system. A secret image sharing scheme is used for identifying the existence of cheater. The use of verifiable scheme leads helps find the presence of a cheater. The problem of cheating prevention exists and researchers have proposed scheme like Cheating-prevention visual secret-sharing (CPVSS) schemes. This paper is based on the study of the cheating prevention happening in Visual Cryptography.

References

  1. M. Naor And A. Shamir, “Visual Cryptography,” In Advances In Cryptology, Vol. 950. New York, Ny, Usa: Springer-Verlag, 1995, Pp. 1–12.
  2. Kai-Hui Lee , Pei-Ling Chiu, “Digital Image Sharing by Diverse Image media”,IEEE Transactions on Information Forensics and Security, vol 9, No. 1,pp.88-98,January 2014. Ding, W. and Marchionini, G. 1997 A Study on Video Browsing Strategies. Technical Report. University of Maryland at College Park.
  3. Tan, Xiaoqing, and Qiong Zhang. "A Kind of Verifiable Visual Cryptography Scheme." Emerging Intelligent Data and Web Technologies (EIDWT), 2013 Fourth International Conference on. IEEE, 2013.
  4. Chen, Yu-Chi, Du-Shiau Tsai, and Gwoboa Horng. "Visual secret sharing with cheating prevention revisited." Digital Signal Processing 23.5 (2013): 1496-1504.
  5. Horng, Gwoboa, Tzungher Chen, and Du-Shiau Tsai. "Cheating in visual cryptography." Designs, Codes and Cryptography 38.2 (2006): 219-236.
  6. Patil, Smita, and Jyoti Rao. "Survey of Cheating Prevention Techniques in Visual Cryptography." International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064..
  7. Hu, Chih-Ming, and Wen-Guey Tzeng. "Cheating prevention in visual cryptography." Image Processing, IEEE Transactions on 16.1 (2007): 36-45.
  8. Chen, Yu-Chi, Gwoboa Horng, and Du-Shiau Tsai. "Comment on “cheating prevention in visual cryptography”." Image Processing, IEEE Transactions on 21.7 (2012): 3319-3323.
  9. Rose, A. Angel, and Sabu M. Thampi. "A Secure Verifiable Scheme for Secret Image Sharing." Procedia Computer Science 58 (2015): 140-150.
  10. Jana, Biswabandhu, et al. "Cheating prevention in Visual Cryptography using steganographic scheme." Issues and Challenges in Intelligent Computing Techniques (ICICT), 2014 International Conference on. IEEE, 2014.
  11. Chen, Qin, et al. "An (n, n) threshold Visual Cryptography Scheme for Cheating prevention." Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on. Vol. 8. IEEE, 2010.
  12. Mostaghim, Melika, and Reza Boostani. "CVC: Chaotic visual cryptography to enhance steganography." Information Security and Cryptology (ISCISC), 2014 11th International ISC Conference on. IEEE, 2014.
  13. Jana, Biswabandhu, et al. "Cheating prevention in Visual Cryptographic Schemes using message embedding: A hardware based practical approach."Issues and Challenges in Intelligent Computing Techniques (ICICT), 2014 International Conference on. IEEE, 2014.

Keywords

Cheaters, Cheating Prevention, Cheating Activity, Visual Secret Sharing (VSS).