Lower Bound for Visual Cryptography Schemes
نویسندگان
چکیده
For a given visual cryptography scheme, it is possible to present a basis matrices for it and most of constructions are based on basis matrices. In this paper we introduce a lower bound for the pixel expansion of visual cryptography schemes with basis matrices. To make the main theorem more flexible, we will introduce a lower bound based on induced matchings of hypergraph of qualified sets. As an application, we present an algebraic proof for the fact that the pixel expansion of basis matrices of any k out of k scheme is at least 2. In the sequel, we present a lower bound for the pixel expansion of a given graph access structure in term of maximum number of edges in an induced matching. Finally, we show that the minimum pixel expansion of basis matrices of graph access structure Pn is exactly ⌈ n+1 2 ⌉ and this shows the lower bound mentioned in the main theorem is sharp.
منابع مشابه
Maximal Independent Sets for the Pixel Expansion of Graph Access Structure
Abstract : A visual cryptography scheme based on a given graph G is a method to distribute a secret image among the vertices of G, the participants, so that a subset of participants can recover the secret image if they contain an edge of G, by stacking their shares, otherwise they can obtain no information regarding the secret image. In this paper a maximal independent sets of the graph G was ...
متن کاملOn the Pixel Expansion of Hypergraph Access Structures in Visual Cryptography Schemes
In a visual cryptography scheme, a secret image is encoded into n shares, in the form of transparencies. The shares are then distributed to n participants. Qualified subsets of participants can recover the secret image by superimposing their transparencies, but non-qualified subsets of participants have no information about the secret image. Pixel expansion, which represents the number of subpi...
متن کاملMAXIMAL INDEPENDENT SETS FOR THE PIXEL EXPANSION OF GRAPH ACCESS STRUCTURE
Given a graph G, a visual cryptography scheme based on the graph G is a method to distribute a secret image among the vertices of G, the participants, so that a subset of participants can recover the secret image if they contain an edge of G, by stacking their shares, otherwise they can obtain no information regarding the secret image. In this paper we apply maximal independent sets of the grap...
متن کاملLower Bounds for Visual Cryptography Schemes
A visual cryptography scheme is a method to secretly share an image among a given group of participants. In this paper, we investigate the best pixel expansion of different models of visual cryptography schemes. In this regard, we consider visual cryptography schemes satisfying the model introduced by Tzeng and Hu [13]. In such a model the recovered secret image can be darker or lighter than th...
متن کاملBounds for visual cryptography schemes
A visual cryptography scheme is a method to secretly share an image among a given group of participants. In this paper, we investigate the best pixel expansion of different models of visual cryptography schemes. In this regard, we consider visual cryptography schemes satisfying the model introduced by Tzeng and Hu [13]. In such a model the recovered secret image can be darker or lighter than th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/0710.4828 شماره
صفحات -
تاریخ انتشار 2007