Perfect contrast XOR-based visual cryptography schemes via linear algebra

被引:45
|
作者
Shen, Gang [1 ]
Liu, Feng [2 ,3 ]
Fu, Zhengxin [1 ]
Yu, Bin [1 ]
机构
[1] Zhengzhou Informat Sci & Technol Inst, Zhengzhou 450000, Henan, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[3] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100093, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Visual cryptography; XOR; General access structure; Linear algebra; Perfect contrast; PIXEL EXPANSION;
D O I
10.1007/s10623-016-0285-5
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
XOR-based visual cryptography scheme (XVCS) was proposed to solve the poor visual quality problem without darkening the background in the reconstructed secret image. However, investigations on XVCS are not sufficient. In this paper, we focus on the traditional model of VCS for general access structures and exploit some extended capabilities for XVCS. Our main contributions are: (1) we put forward constructions of perfect contrast XVCS using the linear algebraic technique without any assumptions such as participants may carry multiple shares or prior information about the shares are to be submitted during the secret reconstruction phase; (2) for some restricted access structures, we achieve perfect contrast and perfect pixel expansion, namely both 1, which is impossible for any OR-based visual cryptography scheme (OVCS); (3) for general access structures, we achieve perfect contrast with smaller pixel expansion compared with many of the results in the literature; (4) Theoretical analysis on the proposed constructions are provided, as well as extensive experimental results and comparisons for demonstrating the effectiveness and advantages of our constructions.
引用
收藏
页码:15 / 37
页数:23
相关论文
共 50 条
  • [31] XOR-Based Schemes for Fast Parallel IP Lookups
    Giancarlo Bongiovanni
    Paolo Penna
    Theory of Computing Systems, 2005, 38 : 481 - 501
  • [32] An algebraic interpretation of the XOR-based Secret Sharing Schemes
    Suga, Yuji
    PROCEEDINGS OF 2018 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA2018), 2018, : 228 - 231
  • [33] XOR-based schemes for fast parallel IP lookups
    Bongiovanni, G
    Penna, P
    ALGORITHMS AND COMPLEXITY, PROCEEDINGS, 2003, 2653 : 238 - 250
  • [34] XOR-Based Meaningful (n, n) Visual Multi-Secrets Sharing Schemes
    Huang, Sheng-Yao
    Lo, An-hui
    Juan, Justie Su-Tzu
    APPLIED SCIENCES-BASEL, 2022, 12 (20):
  • [35] XOR-based schemes for fast parallel IP lookups
    Bongiovanni, G
    Penna, P
    THEORY OF COMPUTING SYSTEMS, 2005, 38 (04) : 481 - 501
  • [36] Multi-factor Authentication Using Recursive XOR-Based Visual Cryptography in Online Voting System
    Naidu, P. Sanyasi
    Kharat, Reena
    SECURITY IN COMPUTING AND COMMUNICATIONS, SSCC 2016, 2016, 625 : 52 - 62
  • [37] An efficient XOR-based verifiable visual cryptographic scheme
    Jia, Xingxing
    Wang, Daoshun
    Chu, Qimeng
    Chen, Zhenhua
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (07) : 8207 - 8223
  • [38] An efficient XOR-based verifiable visual cryptographic scheme
    Xingxing Jia
    Daoshun Wang
    Qimeng Chu
    Zhenhua Chen
    Multimedia Tools and Applications, 2019, 78 : 8207 - 8223
  • [39] Automatic analysis of the security of XOR-based key management schemes
    Cortier, Veronique
    Keighren, Gavin
    Steel, Graham
    TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, PROCEEDINGS, 2007, 4424 : 538 - +
  • [40] Efficient, XOR-Based, Ideal (t,n) - threshold Schemes
    Chen, Liqun
    Laing, Thalia M.
    Martin, Keith M.
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2016, 2016, 10052 : 467 - 483