Extended visual cryptography schemes

被引:16
|
作者
Klein, Andreas [1 ]
Wessler, Markus [1 ]
机构
[1] Univ Kassel, Fachberich Math & Informat, D-34132 Kassel, Germany
关键词
D O I
10.1016/j.ic.2006.12.005
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Visual cryptography schemes have been introduced in 1994 by Naor and Shamir. Their idea was to encode a secret image into n shadow images and to give exactly one such shadow image to each member of a group P of n persons. Whereas most work in recent years has been done concerning the problem of qualified and forbidden subsets of P or the question of contrast optimizing, in this paper we study extended visual cryptography schemes, i.e., shared secret systems where any subset of' P shares its own secret. (c) 2007 Published by Elsevier Inc.
引用
收藏
页码:716 / 732
页数:17
相关论文
共 50 条
  • [11] Improved schemes for visual cryptography
    Blundo, C
    Bonis, AD
    Santis, AD
    DESIGNS CODES AND CRYPTOGRAPHY, 2001, 24 (03) : 255 - 278
  • [12] Probabilistic visual cryptography schemes
    Cimato, S
    De Prisco, R
    De Santis, A
    COMPUTER JOURNAL, 2006, 49 (01): : 97 - 107
  • [13] On the contrast in visual cryptography schemes
    Blundo, C
    De Santis, A
    Stinson, DR
    JOURNAL OF CRYPTOLOGY, 1999, 12 (04) : 261 - 289
  • [14] Bounds for visual cryptography schemes
    Hajiabolhassan, Hossein
    Cheraghi, Abbas
    DISCRETE APPLIED MATHEMATICS, 2010, 158 (06) : 659 - 665
  • [15] Probabilistic visual cryptography schemes
    Cimato, S.
    De Prisco, Rob
    De Santis, A.
    Computer Journal, 2006, 49 (01): : 97 - 107
  • [16] Visual cryptography & threshold schemes
    Stinson, D
    DR DOBBS JOURNAL, 1998, 23 (04): : 36 - +
  • [17] Visual Cryptography Schemes with Reversing
    Yang, Ching-Nung
    Wang, Chung-Chun
    Chen, Tse-Shih
    COMPUTER JOURNAL, 2008, 51 (06): : 710 - 722
  • [18] Extended XOR-based visual cryptography schemes by integer linear program
    Wu, Xiaotian
    Yao, Peng
    An, Na
    SIGNAL PROCESSING, 2021, 186
  • [19] Embedded Extended Visual Cryptography
    Jacob, T. Prem
    Pravin, A.
    Asha, P.
    INTERNATIONAL CONFERENCE ON INTELLIGENT DATA COMMUNICATION TECHNOLOGIES AND INTERNET OF THINGS, ICICI 2018, 2019, 26 : 1233 - 1240
  • [20] Extended capabilities for visual cryptography
    Ateniese, G
    Blundo, C
    De Santis, A
    Stinson, DR
    THEORETICAL COMPUTER SCIENCE, 2001, 250 (1-2) : 143 - 161