Nested visual cryptography scheme

被引:0
|
作者
Yuan Zhonglan [1 ]
Xia Guangsheng
Du Ye [1 ]
机构
[1] Beijing Jiaotong Univ, Sch Comp & Informat Technol, Beijing 100044, Peoples R China
基金
国家高技术研究发展计划(863计划);
关键词
visual cryptography scheme (VCS); visual cryptography; secret sharing;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Anew nested visual cryptography scheme is proposed for n cooperated user groups. It can encode the secret image consists of black and white pixels into share images which should be distributed to each user in each group. To decode the secret, users in at least k out of n groups should be present, and at least p out of q users should provide their shares for each attendant group (where p and q can be distinct for each group). For the proposed scheme, the known scheme can be regarded as a simple instance which has only one user in each group. Compared to S-extended visual cryptography scheme, there is no need to enumerate all the user sets which can decode the secret.
引用
收藏
页码:459 / 463
页数:5
相关论文
共 50 条
  • [1] A Novel Visual Cryptography Scheme
    Jena, Debasish
    Jena, Sanjay Kumar
    [J]. INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL : ICACC 2009 - PROCEEDINGS, 2009, : 207 - 211
  • [2] Indirect visual cryptography scheme
    Yang, Xiubo
    Li, Tuo
    Shi, Yishi
    [J]. AOPC 2015: IMAGE PROCESSING AND ANALYSIS, 2015, 9675
  • [3] On the randomness of visual cryptography scheme
    Guo, Teng
    Liu, Feng
    Wu, ChuanKun
    Ren, YaWei
    Wang, Wen
    [J]. 2013 NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2013), 2013, : 391 - 394
  • [4] A verifiable visual cryptography scheme
    Han, Yan-Yan
    Wang, Su-Ying
    Hu, Yu-Pu
    He, Wen-Cai
    [J]. Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology, 2009, 31 (01): : 86 - 89
  • [5] Color visual cryptography scheme
    Yi, Feng
    Wang, Daoshun
    Dai, Yiqi
    [J]. Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao/Journal of Computer-Aided Design and Computer Graphics, 2006, 18 (11): : 1770 - 1775
  • [6] A Verifiable Visual Cryptography Scheme
    Yu, Bin
    Fang, Liguo
    Xu, Xiaohui
    [J]. 2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 908 - 911
  • [7] Visual Cryptography Scheme with Autostereogram
    Wang, Dao-Shun
    Yi, Feng
    Yang, Ching-Nung
    [J]. DIGITAL-FORENSICS AND WATERMARKING, IWDW 2014, 2015, 9023 : 364 - 375
  • [8] Research on Rotation Visual Cryptography Scheme
    Fu, Zhengxin
    Yu, Bin
    [J]. IEEC 2009: FIRST INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE, PROCEEDINGS, 2009, : 533 - 536
  • [9] Visual Cryptography Scheme with Essential Participants
    Li, Peng
    Yin, Liping
    Ma, Jianfeng
    [J]. MATHEMATICS, 2020, 8 (05)
  • [10] Digital watermarking scheme with visual cryptography
    Hsu, Ching-Sheng
    Tu, Shu-Fen
    [J]. IMECS 2008: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2008, : 659 - 662