Measure-Independent Characterization of Contrast Optimal Visual Cryptography Schemes

被引:0
|
作者
D'Arco, Paolo [1 ]
De Prisco, Roberto [1 ]
De Santis, Alfredo [1 ]
机构
[1] Univ Salerno, Dipartimento Informat, I-84084 Fisciano, SA, Italy
关键词
Secret sharing; Visual cryptography; Optimal contrast; SECRET SHARING SCHEMES; PERFECT RECONSTRUCTION; IMAGE ENCRYPTION;
D O I
10.1007/978-3-319-04268-8_3
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The contrast in visual cryptography has received a lot of attention. It has been studied using three different measures. In this paper we follow a measure-independent approach, which, by using the structural properties of the schemes, enables us to provide a characterization of optimal schemes that is independent of the specific measure used to assess the contrast. In particular we characterize and provide constructions of optimal schemes for the cases of (2,n)-threshold and (n,n)threshold schemes. Then, we apply the measure-independent results to the three measures that have been used in the literature obtaining both new characterizations and constructions of optimal schemes and alternative proofs of known results.
引用
收藏
页码:39 / 55
页数:17
相关论文
共 50 条
  • [41] Visual Cryptography and Random Grids Schemes
    Fu, Zheng-xin
    Yu, Bin
    DIGITAL-FORENSICS AND WATERMARKING, IWDW 2013, 2014, 8389 : 109 - 122
  • [42] Step Construction of Visual Cryptography Schemes
    Liu, Feng
    Wu, Chuankun
    Lin, Xijun
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (01) : 27 - 38
  • [43] Embedded Extended Visual Cryptography Schemes
    Liu, Feng
    Wu, Chuankun
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (02) : 307 - 322
  • [44] An Extensive Review on Visual Cryptography Schemes
    Ramya, J.
    Parvathavarthini, B.
    2014 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT), 2014, : 223 - 228
  • [45] The alignment problem of visual cryptography schemes
    Feng Liu
    Chuan Kun Wu
    Xi Jun Lin
    Designs, Codes and Cryptography, 2009, 50 : 215 - 227
  • [46] On the extension of XOR step construction for optimal contrast grey level visual cryptography
    Praveen, K.
    Sethumadhavan, M.
    2017 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2017, : 219 - 222
  • [47] Evolution of the contrast with misalignment in visual cryptography
    Machizaud, Jacques
    Fournel, Thierry
    2012 11TH EURO-AMERICAN WORKSHOP ON INFORMATION OPTICS (WIO), 2012,
  • [48] On general construction for extended visual cryptography schemes
    Wang, Daoshun
    Yi, Feng
    Li, Xiaobo
    PATTERN RECOGNITION, 2009, 42 (11) : 3071 - 3082
  • [49] Threshold Visual Cryptography Schemes With Tagged Shares
    Chiu, Pei-Ling
    Lee, Kai-Hui
    IEEE ACCESS, 2020, 8 : 111330 - 111346
  • [50] Embedded Visual Cryptography Schemes for Secret Images
    Anandhi
    Satthiyaraj, S.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (12): : 153 - 158