On the randomness of visual cryptography scheme

被引:2
|
作者
Guo, Teng [1 ]
Liu, Feng [1 ]
Wu, ChuanKun [1 ]
Ren, YaWei [1 ]
Wang, Wen [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
关键词
Visual cryptography; decomposition-based; randomness;
D O I
10.1109/IIH-MSP.2013.104
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The randomness of visual cryptography scheme (VCS) measures at least how many random bits are required to encode a secret pixel. In this paper, the randomness of decomposition-based VCS proposed by Ateniese et al. is reduced significantly.
引用
收藏
页码:391 / 394
页数:4
相关论文
共 50 条
  • [1] Randomness in visual cryptography
    De Bonis, A
    De Santis, A
    [J]. STACS 2000: 17TH ANNUAL SYMPOSIUM ON THEORETICAL ASPECT OF COMPUTER SCIENCE, 2000, 1770 : 626 - 638
  • [2] Randomness in secret sharing and visual cryptography schemes
    De Bonis, A
    De Santis, A
    [J]. THEORETICAL COMPUTER SCIENCE, 2004, 314 (03) : 351 - 374
  • [3] Testing the randomness of shares in color visual cryptography
    Leszek J. Chmielewski
    Mariusz Nieniewski
    Arkadiusz Orłowski
    [J]. Pattern Analysis and Applications, 2021, 24 : 1475 - 1487
  • [4] Testing the randomness of shares in color visual cryptography
    Chmielewski, Leszek J.
    Nieniewski, Mariusz
    Orlowski, Arkadiusz
    [J]. PATTERN ANALYSIS AND APPLICATIONS, 2021, 24 (04) : 1475 - 1487
  • [5] New results on the randomness of visual cryptography schemes
    De Bonis, A
    De Santis, A
    [J]. CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, 2001, 20 : 187 - 201
  • [6] A Novel Visual Cryptography Scheme
    Jena, Debasish
    Jena, Sanjay Kumar
    [J]. INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL : ICACC 2009 - PROCEEDINGS, 2009, : 207 - 211
  • [7] Indirect visual cryptography scheme
    Yang, Xiubo
    Li, Tuo
    Shi, Yishi
    [J]. AOPC 2015: IMAGE PROCESSING AND ANALYSIS, 2015, 9675
  • [8] Nested visual cryptography scheme
    Yuan Zhonglan
    Xia Guangsheng
    Du Ye
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2008, 17 (03) : 459 - 463
  • [9] A Verifiable Visual Cryptography Scheme
    Yu, Bin
    Fang, Liguo
    Xu, Xiaohui
    [J]. 2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 908 - 911
  • [10] Visual Cryptography Scheme with Autostereogram
    Wang, Dao-Shun
    Yi, Feng
    Yang, Ching-Nung
    [J]. DIGITAL-FORENSICS AND WATERMARKING, IWDW 2014, 2015, 9023 : 364 - 375