On the generality of (k, n) XOR-based Visual Cryptography Scheme

被引:0
|
作者
Shen, Gang [1 ]
Fu, Zheng-Xin [1 ]
Yu, Bin [1 ]
机构
[1] Information Engineering University, Zhengzhou 450004, China
关键词
Structural optimization - Pixels - Cryptography;
D O I
10.3724/SP.J.1146.2012.01719
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
The necessary condition of the optimal pixel expansion is given and proved in (k, n) XOR-based Visual Cryptography Scheme (XVCS). A new method is designed for constructing (k, n)-XVCS by use of basis matrices. The method is proved to be suitable for (k, n)-XVCS with 2n. Based on the above results, the secret sharing and recovering algorithms are proposed. The experimental results show that the pixel expansion can be decreased efficiently. Furthermore, the secret images can be recovered perfectly.
引用
收藏
页码:2294 / 2300
相关论文
共 50 条
  • [1] (t, k, n) XOR-based visual cryptography scheme with essential shadows
    Li, Peng
    Ma, Jianfeng
    Ma, Quan
    [J]. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2020, 72
  • [2] XOR-based visual cryptography scheme with essential shadows
    Li, Peng
    Yin, Liping
    Ma, Jianfeng
    Wang, Hongtao
    [J]. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2022, 85
  • [3] Perfect recovery of XOR-based visual cryptography scheme
    Zhengxin Fu
    Yuqiao Cheng
    Bin Yu
    [J]. Multimedia Tools and Applications, 2019, 78 : 2367 - 2384
  • [4] Perfect recovery of XOR-based visual cryptography scheme
    Fu, Zhengxin
    Cheng, Yuqiao
    Yu, Bin
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (02) : 2367 - 2384
  • [5] XOR-based Visual Cryptography schemes
    Tuyls, P
    Hollmann, HDL
    van Lint, JH
    Tolhuizen, L
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2005, 37 (01) : 169 - 186
  • [6] XOR-based Visual Cryptography Schemes
    P. Tuyls
    H. D. L. Hollmann
    J. H. Van Lint
    L. Tolhuizen
    [J]. Designs, Codes and Cryptography, 2005, 37 : 169 - 186
  • [7] An efficient XOR-based visual cryptography scheme with lossless reconfigurable algorithms
    Wang, Huan
    Jiang, Zhongyuan
    Qian, Qing
    Wang, Hong
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2022, 18 (04)
  • [8] Property Analysis of XOR-Based Visual Cryptography
    Yang, Ching-Nung
    Wang, Dao-Shun
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2014, 24 (02) : 189 - 197
  • [9] Extended Capabilities for XOR-Based Visual Cryptography
    Wu, Xiaotian
    Sun, Wei
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (10) : 1592 - 1605
  • [10] Non-expansible XOR-based visual cryptography scheme with meaningful shares
    Cu, Duanhao
    Sun, Wei
    Wu, Xiaotian
    [J]. SIGNAL PROCESSING, 2015, 108 : 604 - 621