Optimal XOR Based (2, n)-Visual Cryptography Schemes

نویسندگان

  • Feng Liu
  • Chuan Kun Wu
چکیده

A (2, n)-Visual Cryptography Scheme (VCS) is a kind of secret sharing scheme, where n participants share a secret image, and any two of them can recover the secret image visually without any cryptographic knowledge and computation devices, but any one of them cannot get any information about the secret image other than the size of the secret image. This paper studies the (2, n)−V CSXOR, and shows the smallest (optimal) pixel expansion of such schemes, and the largest possible contrast for the (2, n) − V CSXOR given its optimal pixel expansion. It also shows the largest (optimal) contrast of the (2, n)− V CSXOR, and the smallest possible pixel expansion of such schemes given their optimal contrast. The results of this paper show that the (2, n) − V CSXOR can achieve smaller pixel expansion and larger contrast than that of (2, n)− V CSOR. It also shows that the construction of the basis matrix of optimal contrast (2, n)−V CSXOR is equivalent to the construction of binary codes when they reach the maximum capability, and the construction of a specific class of optimal contrast (2, n) − V CSXOR for n = 2 − 1 is given.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

XOR-based Visual Cryptography Schemes

A recent publication introduced a Visual Crypto (VC) system, based on the polarisation of light. This VC system has good resolution, contrast and colour properties. Mathematically, the VC system is described by the XOR operation (modulo two addition). In this paper we investigate Threshold Visual Secret Sharing schemes associated to XOR-based VC systems. Firstly, we show that n out of n schemes...

متن کامل

On the Pixel Expansion of Hypergraph Access Structures in Visual Cryptography Schemes

In a visual cryptography scheme, a secret image is encoded into n shares, in the form of transparencies. The shares are then distributed to n participants. Qualified subsets of participants can recover the secret image by superimposing their transparencies, but non-qualified subsets of participants have no information about the secret image. Pixel expansion, which represents the number of subpi...

متن کامل

Efficient Constructions for t- (k, n)*-Random Grid Visual Cryptographic Schemes

In this paper we consider both “OR” and “XOR” based monochrome random grid visual cryptographic schemes (RGVCS) for t-(k, n)∗ access structure which is a generalization of the threshold (k, n) access structure in the sense that in all the successful attempts to recover the secret image, the t essential participants must always be present, i.e., a group of k or more participants can get back the...

متن کامل

Optimal (2, n) visual cryptographic schemes

In (2, n) visual cryptographic schemes, a secret image(text or picture) is encrypted into n shares which are distributed among n participants. The image cannot be decoded from any single share but any two participants can together decode it visually, without using any complex decoding mechanism. In this paper, we introduce three meaningful optimality criteria for evaluating different schemes an...

متن کامل

Hiding Medical Information of Patient through Image by Recursive Visual Cryptography

This paper introduces recursively hiding patient’s information using XOR based Recursive Visual Cryptography. The XOR based Visual Cryptography Scheme (VCS) encodes a secret image of data into several shares which are not understood by intruders individually. Here (2, 2) VCS is considered for paper. Its pixel expansion has more columns then original and same number of rows but the image quality...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010