Extended visual cryptography schemes

被引:16
|
作者
Klein, Andreas [1 ]
Wessler, Markus [1 ]
机构
[1] Univ Kassel, Fachberich Math & Informat, D-34132 Kassel, Germany
关键词
D O I
10.1016/j.ic.2006.12.005
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Visual cryptography schemes have been introduced in 1994 by Naor and Shamir. Their idea was to encode a secret image into n shadow images and to give exactly one such shadow image to each member of a group P of n persons. Whereas most work in recent years has been done concerning the problem of qualified and forbidden subsets of P or the question of contrast optimizing, in this paper we study extended visual cryptography schemes, i.e., shared secret systems where any subset of' P shares its own secret. (c) 2007 Published by Elsevier Inc.
引用
收藏
页码:716 / 732
页数:17
相关论文
共 50 条
  • [41] Visual cryptography schemes with optimal pixel expansion
    Blundo, Carlo
    Cimato, Stelvio
    De Santis, Alfredo
    THEORETICAL COMPUTER SCIENCE, 2006, 369 (1-3) : 169 - 182
  • [42] New results on the randomness of visual cryptography schemes
    De Bonis, A
    De Santis, A
    CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, 2001, 20 : 187 - 201
  • [43] Registration-tolerant extended visual cryptography
    Nakajima, M
    Yamaguchi, Y
    HUMAN VISION AND ELECTRONIC IMAGING VIII, 2003, 5007 : 473 - 484
  • [44] Visual cryptography schemes with perfect reconstruction of black pixels
    Blundo, C
    De Santis, A
    COMPUTERS & GRAPHICS, 1998, 22 (04) : 449 - 455
  • [45] Random-Grid-Based Visual Cryptography Schemes
    Hou, Young-Chang
    Wei, Shih-Chieh
    Lin, Chia-Yin
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2014, 24 (05) : 733 - 744
  • [46] Video Identification Based on Watermarking Schemes and Visual Cryptography
    Wafy, Maged
    Zanaty, Samr Gamal
    Elkhouly, Mahmoud
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 40 (02): : 441 - 453
  • [47] Optimal Contrast Grayscale Visual Cryptography Schemes With Reversing
    Wang, Dao-Shun
    Song, Tao
    Dong, Lin
    Yang, Ching-Nung
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (12) : 2059 - 2072
  • [48] Compatible ideal contrast visual cryptography schemes with reversing
    Hu, CM
    Tzeng, WG
    INFORMATION SECURITY, PROCEEDINGS, 2005, 3650 : 300 - 313
  • [49] Error Filtering Schemes for Color Images in Visual Cryptography
    Malar, Shiny F. R.
    Kumar, Jeya M. K.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2011, 2 (11) : 71 - 76
  • [50] Tamperproof Transmission of Fingerprints Using Visual Cryptography Schemes
    Monoth, Thomas
    Anto, Babu P.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE AND EXHIBITION ON BIOMETRICS TECHNOLOGY, 2010, 2 : 143 - 148