On the randomness of visual cryptography scheme

被引:2
|
作者
Guo, Teng [1 ]
Liu, Feng [1 ]
Wu, ChuanKun [1 ]
Ren, YaWei [1 ]
Wang, Wen [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
关键词
Visual cryptography; decomposition-based; randomness;
D O I
10.1109/IIH-MSP.2013.104
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The randomness of visual cryptography scheme (VCS) measures at least how many random bits are required to encode a secret pixel. In this paper, the randomness of decomposition-based VCS proposed by Ateniese et al. is reduced significantly.
引用
收藏
页码:391 / 394
页数:4
相关论文
共 50 条
  • [41] On the Impossibility of Cryptography with Tamperable Randomness
    Austrin, Per
    Chung, Kai-Min
    Mahmoody, Mohammad
    Pass, Rafael
    Seth, Karn
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT I, 2014, 8616 : 462 - 479
  • [42] Contrast Optimization for Size Invariant Visual Cryptography Scheme
    Wu, Xiaotian
    Fang, Jia
    Yan, Wei Qi
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2023, 32 : 2174 - 2189
  • [43] A Verifiable Visual Cryptography Scheme Using Neural Networks
    Deng Yuqiao
    Song Ge
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 113 - 116
  • [44] Optimal pixel expansion of deterministic visual cryptography scheme
    Fu, Zhengxin
    Yu, Bin
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 73 (03) : 1177 - 1193
  • [45] A general multi-secret visual cryptography scheme
    Yang, Ching-Nung
    Chung, Ting-Hao
    [J]. OPTICS COMMUNICATIONS, 2010, 283 (24) : 4949 - 4962
  • [46] Natural language letter based visual cryptography scheme
    Lin, Hsiao-Ching
    Yang, Ching-Nung
    Laih, Chi-Sung
    Lin, Hui-Tang
    [J]. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2013, 24 (03) : 318 - 331
  • [47] A Novel Copyright Protection Scheme Using Visual Cryptography
    Nag, Amitava
    Singh, Jyoti Prakash
    Biswas, Sushanta
    Sarkar, D.
    Sarkar, Partha Pratim
    [J]. ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 2, 2011, 191 : 612 - 619
  • [48] Color Image Visual Cryptography Scheme with Enhanced Security
    Khokhar, Prachi
    Jena, Debasish
    [J]. PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS, FICTA 2016, VOL 1, 2017, 515 : 267 - 279
  • [49] Secure QR Code Scheme Based on Visual Cryptography
    Cao, Xiaohe
    Feng, Liuping
    Cao, Peng
    Hu, Jianhua
    [J]. PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRIAL ENGINEERING (AIIE 2016), 2016, 133 : 433 - 436
  • [50] Collusive Attacks to Partition Authentication Visual Cryptography Scheme
    Ren, Yawei
    Liu, Feng
    Wang, Wen
    [J]. DIGITAL FORENSICS AND WATERMARKING, IWDW 2016, 2017, 10082 : 238 - 250