Lower Bound for Visual Cryptography Schemes

نویسندگان

  • Abbas Cheraghi
  • Hossein Hajiabolhassan
چکیده

For a given visual cryptography scheme, it is possible to present a basis matrices for it and most of constructions are based on basis matrices. In this paper we introduce a lower bound for the pixel expansion of visual cryptography schemes with basis matrices. To make the main theorem more flexible, we will introduce a lower bound based on induced matchings of hypergraph of qualified sets. As an application, we present an algebraic proof for the fact that the pixel expansion of basis matrices of any k out of k scheme is at least 2. In the sequel, we present a lower bound for the pixel expansion of a given graph access structure in term of maximum number of edges in an induced matching. Finally, we show that the minimum pixel expansion of basis matrices of graph access structure Pn is exactly ⌈ n+1 2 ⌉ and this shows the lower bound mentioned in the main theorem is sharp.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Maximal Independent Sets for the Pixel Expansion of Graph Access Structure

 Abstract : A visual cryptography scheme based on a given graph G is a method to distribute a secret image among the vertices of G, the participants, so that a subset of participants can recover the secret image if they contain an edge of G, by stacking their shares, otherwise they can obtain no information regarding the secret image. In this paper a maximal independent sets of the graph G was ...

متن کامل

On the Pixel Expansion of Hypergraph Access Structures in Visual Cryptography Schemes

In a visual cryptography scheme, a secret image is encoded into n shares, in the form of transparencies. The shares are then distributed to n participants. Qualified subsets of participants can recover the secret image by superimposing their transparencies, but non-qualified subsets of participants have no information about the secret image. Pixel expansion, which represents the number of subpi...

متن کامل

MAXIMAL INDEPENDENT SETS FOR THE PIXEL EXPANSION OF GRAPH ACCESS STRUCTURE

Given a graph G, a visual cryptography scheme based on the graph G is a method to distribute a secret image among the vertices of G, the participants, so that a subset of participants can recover the secret image if they contain an edge of G, by stacking their shares, otherwise they can obtain no information regarding the secret image. In this paper we apply maximal independent sets of the grap...

متن کامل

Lower Bounds for Visual Cryptography Schemes

A visual cryptography scheme is a method to secretly share an image among a given group of participants. In this paper, we investigate the best pixel expansion of different models of visual cryptography schemes. In this regard, we consider visual cryptography schemes satisfying the model introduced by Tzeng and Hu [13]. In such a model the recovered secret image can be darker or lighter than th...

متن کامل

Bounds for visual cryptography schemes

A visual cryptography scheme is a method to secretly share an image among a given group of participants. In this paper, we investigate the best pixel expansion of different models of visual cryptography schemes. In this regard, we consider visual cryptography schemes satisfying the model introduced by Tzeng and Hu [13]. In such a model the recovered secret image can be darker or lighter than th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/0710.4828  شماره 

صفحات  -

تاریخ انتشار 2007