منابع مشابه
XOR-based Visual Cryptography Schemes
A recent publication introduced a Visual Crypto (VC) system, based on the polarisation of light. This VC system has good resolution, contrast and colour properties. Mathematically, the VC system is described by the XOR operation (modulo two addition). In this paper we investigate Threshold Visual Secret Sharing schemes associated to XOR-based VC systems. Firstly, we show that n out of n schemes...
متن کاملOptimal XOR Based (2, n)-Visual Cryptography Schemes
A (2, n)-Visual Cryptography Scheme (VCS) is a kind of secret sharing scheme, where n participants share a secret image, and any two of them can recover the secret image visually without any cryptographic knowledge and computation devices, but any one of them cannot get any information about the secret image other than the size of the secret image. This paper studies the (2, n)−V CSXOR, and sho...
متن کاملProbabilistic Visual Cryptography Schemes
Visual cryptography schemes allow the encoding of a secret image, consisting of black or white pixels, inton shares which are distributed to the participants. The shares are such that only qualified subsets of participants can ‘visually’ recover the secret image. The secret pixels are shared with techniques that subdivide each secret pixel into a certain number m, m ≥ 2 of subpixels. Such a par...
متن کاملExtended visual cryptography schemes
Abstract. Visual cryptography schemes have been introduced in 1994 by Naor and Shamir. Their idea was to encode a secret image into n shadow images and to give exactly one such shadow image to each member of a group P of n persons. Whereas most work in recent years has been done concerning the problem of qualified and forbidden subsets of P or the question of contrast optimizing, in this paper ...
متن کاملBounds for visual cryptography schemes
A visual cryptography scheme is a method to secretly share an image among a given group of participants. In this paper, we investigate the best pixel expansion of different models of visual cryptography schemes. In this regard, we consider visual cryptography schemes satisfying the model introduced by Tzeng and Hu [13]. In such a model the recovered secret image can be darker or lighter than th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Designs, Codes and Cryptography
سال: 2005
ISSN: 0925-1022,1573-7586
DOI: 10.1007/s10623-004-3816-4