A secure visual secret checking of meaningful sharing images

Chin Ling Chen, Wen Hu Chen, Chih Cheng Chen, Yeong Lin Lai, Kuo Kun Tseng

Research output: Contribution to journalArticle

2 Citations (Scopus)

Abstract

Visual secret checking refers to the superimposition of one key image and another public sharing image without auxiliary automated computation, in order to recognize the specified secret via human inspection. This paper achieves the goals of: guaranteeing that the related contents of a secret are not revealed after any public sharing image superimposition, confirming the accuracy of any public sharing image, and providing for the ease of management of various types of sharing images. When a user is outside of a computer environment, he/she can utilize the proposed method to discern the contents of the secret independently. Furthermore, the key image and all the sharing images have the same meaning, visible upon inspection, which allows for effective data management and classification. Through an exposition of the relevant theory, as well as experimentation, this paper provides evidence for the above claims.

Original languageEnglish
Pages (from-to)2327-2335
Number of pages9
JournalApplied Mathematics and Information Sciences
Volume8
Issue number5
DOIs
Publication statusPublished - 2014 Sep 1

Fingerprint

Sharing
Inspection
Information management
Data Classification
Data Management
Vision
Experimentation

All Science Journal Classification (ASJC) codes

  • Analysis
  • Numerical Analysis
  • Computer Science Applications
  • Computational Theory and Mathematics
  • Applied Mathematics

Cite this

Chen, Chin Ling ; Chen, Wen Hu ; Chen, Chih Cheng ; Lai, Yeong Lin ; Tseng, Kuo Kun. / A secure visual secret checking of meaningful sharing images. In: Applied Mathematics and Information Sciences. 2014 ; Vol. 8, No. 5. pp. 2327-2335.
@article{2d115b7bc2154cfeaba02963380b7250,
title = "A secure visual secret checking of meaningful sharing images",
abstract = "Visual secret checking refers to the superimposition of one key image and another public sharing image without auxiliary automated computation, in order to recognize the specified secret via human inspection. This paper achieves the goals of: guaranteeing that the related contents of a secret are not revealed after any public sharing image superimposition, confirming the accuracy of any public sharing image, and providing for the ease of management of various types of sharing images. When a user is outside of a computer environment, he/she can utilize the proposed method to discern the contents of the secret independently. Furthermore, the key image and all the sharing images have the same meaning, visible upon inspection, which allows for effective data management and classification. Through an exposition of the relevant theory, as well as experimentation, this paper provides evidence for the above claims.",
author = "Chen, {Chin Ling} and Chen, {Wen Hu} and Chen, {Chih Cheng} and Lai, {Yeong Lin} and Tseng, {Kuo Kun}",
year = "2014",
month = "9",
day = "1",
doi = "10.12785/amis/080528",
language = "English",
volume = "8",
pages = "2327--2335",
journal = "Applied Mathematics and Information Sciences",
issn = "1935-0090",
publisher = "Natural Sciences Publishing Corporation",
number = "5",

}

A secure visual secret checking of meaningful sharing images. / Chen, Chin Ling; Chen, Wen Hu; Chen, Chih Cheng; Lai, Yeong Lin; Tseng, Kuo Kun.

In: Applied Mathematics and Information Sciences, Vol. 8, No. 5, 01.09.2014, p. 2327-2335.

Research output: Contribution to journalArticle

TY - JOUR

T1 - A secure visual secret checking of meaningful sharing images

AU - Chen, Chin Ling

AU - Chen, Wen Hu

AU - Chen, Chih Cheng

AU - Lai, Yeong Lin

AU - Tseng, Kuo Kun

PY - 2014/9/1

Y1 - 2014/9/1

N2 - Visual secret checking refers to the superimposition of one key image and another public sharing image without auxiliary automated computation, in order to recognize the specified secret via human inspection. This paper achieves the goals of: guaranteeing that the related contents of a secret are not revealed after any public sharing image superimposition, confirming the accuracy of any public sharing image, and providing for the ease of management of various types of sharing images. When a user is outside of a computer environment, he/she can utilize the proposed method to discern the contents of the secret independently. Furthermore, the key image and all the sharing images have the same meaning, visible upon inspection, which allows for effective data management and classification. Through an exposition of the relevant theory, as well as experimentation, this paper provides evidence for the above claims.

AB - Visual secret checking refers to the superimposition of one key image and another public sharing image without auxiliary automated computation, in order to recognize the specified secret via human inspection. This paper achieves the goals of: guaranteeing that the related contents of a secret are not revealed after any public sharing image superimposition, confirming the accuracy of any public sharing image, and providing for the ease of management of various types of sharing images. When a user is outside of a computer environment, he/she can utilize the proposed method to discern the contents of the secret independently. Furthermore, the key image and all the sharing images have the same meaning, visible upon inspection, which allows for effective data management and classification. Through an exposition of the relevant theory, as well as experimentation, this paper provides evidence for the above claims.

UR - http://www.scopus.com/inward/record.url?scp=84896825417&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84896825417&partnerID=8YFLogxK

U2 - 10.12785/amis/080528

DO - 10.12785/amis/080528

M3 - Article

AN - SCOPUS:84896825417

VL - 8

SP - 2327

EP - 2335

JO - Applied Mathematics and Information Sciences

JF - Applied Mathematics and Information Sciences

SN - 1935-0090

IS - 5

ER -