Contrast optimal threshold visual cryptography schemes

被引:103
|
作者
Blundo, C [1 ]
D'Arco, P
De Santis, A
Stinson, DR
机构
[1] Univ Salerno, Dipartimento Informat & Applicaz, I-84081 Baronissi, SA, Italy
[2] Univ Waterloo, Dept Combinator & Optimizat, Waterloo, ON N2L 3G1, Canada
[3] Univ Waterloo, Sch Comp Sci, Waterloo, ON N2L 3G1, Canada
关键词
visual cryptography; secret sharing schemes;
D O I
10.1137/S0895480198336683
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
A (k, n)-threshold visual cryptography scheme (VCS) is a method to encode a secret image SI into n shadow images called shares such that any k or more shares enable the "visual" recovery of the secret image. However, by inspecting less than k shares one cannot gain any information on the secret image. The "visual" recovery consists of copying the shares onto transparencies and then stacking them. Any k shares will reveal the secret image without any cryptographic computation. In this paper we analyze the contrast of the reconstructed image for a (k, n)-threshold VCS. We define a canonical form for a ( k, n)-threshold VCS and provide a characterization of a ( k, n)-threshold VCS. We completely characterize a contrast optimal (n- 1, n)-threshold VCS in canonical form. Moreover, for n greater than or equal to 4, we provide a contrast optimal ( 3, n)-threshold VCS in canonical form. We first describe a family of (3, n)-threshold VCS achieving various values of contrast and pixel expansion. Then we prove an upper bound on the contrast of any (3, n)-threshold VCS and show that a scheme in the described family has optimal contrast. Finally, for k = 4, 5 we present two schemes with contrast asymptotically equal to 1/64 and 1/256, respectively.
引用
收藏
页码:224 / 261
页数:38
相关论文
共 50 条
  • [41] Perfect contrast XOR-based visual cryptography schemes via linear algebra
    Shen, Gang
    Liu, Feng
    Fu, Zhengxin
    Yu, Bin
    DESIGNS CODES AND CRYPTOGRAPHY, 2017, 85 (01) : 15 - 37
  • [42] Perfect contrast XOR-based visual cryptography schemes via linear algebra
    Gang Shen
    Feng Liu
    Zhengxin Fu
    Bin Yu
    Designs, Codes and Cryptography, 2017, 85 : 15 - 37
  • [43] Construction of visual secret sharing schemes with almost optimal contrast
    Kuhlmann, C
    Simon, HU
    PROCEEDINGS OF THE ELEVENTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, 2000, : 263 - 272
  • [44] The alignment problem of visual cryptography schemes
    Liu, Feng
    Wu, Chuan Kun
    Lin, Xi Jun
    DESIGNS CODES AND CRYPTOGRAPHY, 2009, 50 (02) : 215 - 227
  • [45] Review on Various Visual Cryptography Schemes
    Thomas, Sandhya Anne
    Gharge, Saylee
    2017 INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN COMPUTER, ELECTRICAL, ELECTRONICS AND COMMUNICATION (CTCEEC), 2017, : 1164 - 1167
  • [46] Visual Cryptography and Random Grids Schemes
    Fu, Zheng-xin
    Yu, Bin
    DIGITAL-FORENSICS AND WATERMARKING, IWDW 2013, 2014, 8389 : 109 - 122
  • [47] Step Construction of Visual Cryptography Schemes
    Liu, Feng
    Wu, Chuankun
    Lin, Xijun
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (01) : 27 - 38
  • [48] Embedded Extended Visual Cryptography Schemes
    Liu, Feng
    Wu, Chuankun
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (02) : 307 - 322
  • [49] An Extensive Review on Visual Cryptography Schemes
    Ramya, J.
    Parvathavarthini, B.
    2014 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT), 2014, : 223 - 228
  • [50] The alignment problem of visual cryptography schemes
    Feng Liu
    Chuan Kun Wu
    Xi Jun Lin
    Designs, Codes and Cryptography, 2009, 50 : 215 - 227