Advancements and Applications of Anti-Fraud Graphical Passwords

Authors

  • Jiawen Shi

DOI:

https://doi.org/10.62051/9mwbet40

Keywords:

Visual Cryptography; Deceiver; Cumulative Matrix.

Abstract

Visual cryptography represents a sophisticated and innovative approach to secure information sharing, gaining traction within the field of information security. This technology adeptly transforms sensitive data into visually interpretable graphics or images. These images are then segmented into multiple independent parts, each distributed among different stakeholders. This strategy ensures that no single party can access the complete data without collaboration, thereby enhancing security. This dissertation delves into several anti-fraud visual password schemes designed to mitigate risks associated with deceptive behaviors by participants and distributors alike. By addressing these vulnerabilities, the proposed schemes enhance the integrity and reliability of the data sharing process. The application of visual passwords in real-life scenarios not only bolsters data security but also shields private information from potential leaks. By reducing the complexity and cost associated with traditional decryption methods, visual cryptography offers substantial support for a wide array of application scenarios. This dissertation presents a comprehensive exploration of visual cryptography's potential to revolutionize data protection strategies, illustrating its importance and utility in contemporary digital environments.

Downloads

Download data is not yet available.

References

[1] M. Naor, A. Shamir, Visual cryptography, Adv. Cryptol.-Eurocrypt'94, Lect. Notes Comput. Sci., vol.950, Springer-Verlag, Berlin (1995) 1-12.

[2] J. Guo, H. Yan, Y. Liu, et al., A cheater detectable visual cryptography scheme, Comput. Eng. (2005) 126-128.

[3] X. Xu, B. Yu, A Cheater Detectable VCS without Fringes, Adv. Comput. Technol. Appl.-2007, Proc. 18th Natl. Acad. Conf. Comput. Technol. Appl. (CACIS), China Instrum. Soc. (CIS), China Soc. Syst. Simul. (CSSS), China Instrum. Soc. Microcomput. Appl. (CACIS), Preparatory Div. Complex Syst. Model. Simul. Comput. Spec. Comm. China Soc. Syst. Simul. (CSSC), Coll. Electron. Technol., PLA Inf. Eng. Univ. (2007) 5.

[4] B. Yu, X. Xu, L. Fang, A cheater detectable VCS based on cumulative array, J. Electron. Inf. 31 (2009) 950-953.

[5] Q.P. Mo, X.Q. Tan, Cheater detectable visual cryptography scheme with third trusted party, Comput. Appl. Res. 28 (2011) 2690-2693.

[6] S. Zhang, W. Li, X. Ai, Improved visual cryptography scheme to prevent cheaters, Comput. Appl. Res. 33 (2016) 3770-3773.

[7] P. Geetha, V. Jayanthi, A. Jayanthi, Optimal Visual Cryptographic Scheme with multiple share creation for Multimedia Applications, Comput. & Secur. 78 (2018) 301-320.

[8] Y. Tan, Z. Li, Secure QRcode payment scheme based visual cryptography, Comput. Digit. Eng. 48 (2020) 2712-2716.

[9] Y. Han, X. Liu, P. Li, An anti-spoofing encryption scheme for medical records based on visual cryptography, J. Beijing Inst. Electron. Sci. Technol. 30 (2022) 19-29.

[10] S. Wan, Y. Lu, X. Yan, et al., Visual Secret Sharing Scheme with (k, n) Threshold Based on QR Codes, 2016 12th Int. Conf. Mobile Ad-Hoc Sensor Netw. (MSN), IEEE Comput. Soc. (2016) 374-379.

[11] K. Praveen, M. Sethumadhavan, Cheating immune visual cryptographic scheme with reduced pixel expansion, Prog. Adv. Comput. Intell. Eng., Springer, Singapore (2018) 257-265.

[12] X. Zhu, C. Guo, H. Feng, Y. Huang, Y. Feng, X. Wang, R. Wang, A Review of Key Technologies for Emotion Analysis Using Multimodal Information, Cognitive Computation (2024) 1-27.

[13] D.N. Yang, I. Doh, K.J. Chae, Secure medical image-sharing mechanism based on visual cryptography in EHR system, Int. Conf. Adv. Commun. Technol. (ICACT), Piscataway, NJ, IEEE (2018) 463-467.

[14] W.-Y. Wen, Y.-P. Jan, Y.-M. Fang, et al., Authenticatable medical image sharing scheme combined with blockchain, Small Microcomput. Syst. (2021) 1-9.

[15] J. Fu, N. Wang, Y. Cai, Privacy-Preserving in Healthcare Blockchain Systems Based on Lightweight Message Sharing, Sensors (Basel, Switzerland) 20 (2020).

Downloads

Published

17-10-2024

How to Cite

Shi, J. (2024) “Advancements and Applications of Anti-Fraud Graphical Passwords”, Transactions on Computer Science and Intelligent Systems Research, 6, pp. 143–152. doi:10.62051/9mwbet40.