An efficient XOR-based visual cryptography scheme with lossless reconfigurable algorithms

被引:0
|
作者
Wang, Huan [1 ]
Jiang, Zhongyuan [1 ]
Qian, Qing [1 ]
Wang, Hong [1 ]
机构
[1] Guizhou Univ Finance & Econ, Guiyang, Peoples R China
基金
中国国家自然科学基金;
关键词
Visual cryptography; lossless reconfiguration; XOR operation; pixel expansion; contrast; SECRET SHARING SCHEMES;
D O I
10.1177/15501329221084223
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article proposes an efficient XOR-based visual cryptography scheme with lossless reconfigurable algorithms, which includes an encryption and a decryption schemes for gray-scale and color secret images. The encryption scheme aims to encrypt secret images by mapping them to several shared images that do not suffer any pixel expansion problem and do not reveal any information of the secret images by considering a random column selection algorithm based on the 0-mapping and 1-mapping matrices, where the two matrices are dynamically generated in the encryption scheme. Moreover, the proposed decryption scheme can reconstruct the secret images with only a series of XOR operations. The reconstructed images do not suffer any contrast distortion and pixel expansion problems comparing with their original secret images. Finally, the proposed two schemes are illustrated with the practical examples.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] XOR-based visual cryptography scheme with essential shadows
    Li, Peng
    Yin, Liping
    Ma, Jianfeng
    Wang, Hongtao
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2022, 85
  • [2] Perfect recovery of XOR-based visual cryptography scheme
    Fu, Zhengxin
    Cheng, Yuqiao
    Yu, Bin
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (02) : 2367 - 2384
  • [3] Perfect recovery of XOR-based visual cryptography scheme
    Zhengxin Fu
    Yuqiao Cheng
    Bin Yu
    Multimedia Tools and Applications, 2019, 78 : 2367 - 2384
  • [4] On the generality of (k, n) XOR-based Visual Cryptography Scheme
    Shen, Gang
    Fu, Zheng-Xin
    Yu, Bin
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2013, 35 (10): : 2294 - 2300
  • [5] XOR-based Visual Cryptography schemes
    Tuyls, P
    Hollmann, HDL
    van Lint, JH
    Tolhuizen, L
    DESIGNS CODES AND CRYPTOGRAPHY, 2005, 37 (01) : 169 - 186
  • [6] XOR-based Visual Cryptography Schemes
    P. Tuyls
    H. D. L. Hollmann
    J. H. Van Lint
    L. Tolhuizen
    Designs, Codes and Cryptography, 2005, 37 : 169 - 186
  • [7] An efficient XOR-based verifiable visual cryptographic scheme
    Jia, Xingxing
    Wang, Daoshun
    Chu, Qimeng
    Chen, Zhenhua
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (07) : 8207 - 8223
  • [8] An efficient XOR-based verifiable visual cryptographic scheme
    Xingxing Jia
    Daoshun Wang
    Qimeng Chu
    Zhenhua Chen
    Multimedia Tools and Applications, 2019, 78 : 8207 - 8223
  • [9] Extended Capabilities for XOR-Based Visual Cryptography
    Wu, Xiaotian
    Sun, Wei
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (10) : 1592 - 1605
  • [10] Property Analysis of XOR-Based Visual Cryptography
    Yang, Ching-Nung
    Wang, Dao-Shun
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2014, 24 (02) : 189 - 197