Visual Secret Sharing Schemes with Cyclic Access Structure for Many Images

被引:0
|
作者
Uno, Miyuki [1 ]
Kano, Mikio [1 ]
机构
[1] Ibaraki Univ, Dept Comp & Informat Sci, Hitachi, Ibaraki 3168511, Japan
关键词
CRYPTOGRAPHY SCHEMES; PERFECT RECONSTRUCTION; BLACK PIXELS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider a visual secret sharing scheme with cyclic access structure for n, secret images and n shares, where two consecutive shares decode one secret image. This secret sharing scheme can be constructed by using Droste's method. However the contrast of its scheme is 1/(2n). In this paper, it, is shown that for every integer n >= 4, there exists no coustruction Of such a, visual Secret sharing scheme, having a perfect black reconstruction mid contrast at least 1/4. Also for every even integer n >= 4. a new construction of such A visual sharing scheme that satisfies a slightly weaker condition and has a contrast 1/4 is given.
引用
收藏
页码:84 / 97
页数:14
相关论文
共 50 条
  • [1] Visual secret sharing schemes for plural secret images
    Iwamoto, M
    Yamamoto, H
    [J]. 2003 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, 2003, : 283 - 283
  • [2] Secret sharing schemes with bipartite access structure
    Padró, C
    Sáez, G
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT '98, 1998, 1403 : 500 - 511
  • [3] Secret sharing schemes with bipartite access structure
    Padró, C
    Sáez, G
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (07) : 2596 - 2604
  • [4] Visual Secret Sharing Schemes Encrypting Multiple Images
    Sasaki, Manami
    Watanabe, Yodai
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (02) : 356 - 365
  • [5] A construction method of visual secret sharing schemes for plural secret images
    Iwamoto, M
    Yamamoto, H
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2003, E86A (10) : 2577 - 2588
  • [6] Visual cryptography schemes with dihedral group access structure for many images
    Uno, Miyuki
    Kano, M.
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2007, 4464 : 344 - +
  • [7] The access structure of some secret-sharing schemes
    Renvall, A
    Ding, CS
    [J]. INFORMATION SECURITY AND PRIVACY: 1ST AUSTRALASIAN CONFERENCE, ACISP 96, 1996, 1172 : 67 - 78
  • [8] Visual secret sharing schemes for color images using halftoning
    Prakash, N. Krishna
    Govindaraju, S.
    [J]. ICCIMA 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND MULTIMEDIA APPLICATIONS, VOL III, PROCEEDINGS, 2007, : 174 - +
  • [9] FORMULATION OF VISUAL SECRET SHARING SCHEMES ENCRYPTING MULTIPLE IMAGES
    Sasaki, Manami
    Watanabe, Yodai
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2014,
  • [10] A Partition Based Visual Secret Sharing Schemes for Large Images
    Mishra, Abhishek
    Gupta, Ashutosh
    [J]. 2015 1ST INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2015, : 885 - 890