Visual cryptography schemes with perfect reconstruction of black pixels
نویسندگان
چکیده
Conventional visual cryptography (VC) suffers from a pixel-expansion problem, or an uncontrollable display quality problem for recovered images, and lacks a general approach to construct visual secret sharing schemes (VSSs) for general access structures (GASs). We propose here in a general and systematic approach to address these issues without sophisticated codebook design. The approach can be used for binary secret images in non-computer-aided decryption environments. To avoid pixel expansion, we design a set of column vectors to encrypt secret pixels rather than use the conventional VC-based approach. We begin by formulating a mathematic model for the VC construction problem to find the column vectors for the optimal VC construction, after which we develop a simulatedannealing-based algorithm to solve the problem. It indicates that the display quality of the recovered image is superior to that of previous studies.
منابع مشابه
Probabilistic Visual Cryptography Schemes
Visual cryptography schemes allow the encoding of a secret image, consisting of black or white pixels, inton shares which are distributed to the participants. The shares are such that only qualified subsets of participants can ‘visually’ recover the secret image. The secret pixels are shared with techniques that subdivide each secret pixel into a certain number m, m ≥ 2 of subpixels. Such a par...
متن کاملVisual Cryptography Schemes with Veto Capabilities
Beutelspacher considered a secret sharing scheme having a veto capability. Obana and Kurosawa proved that there exist no such schemes if we do not assume that the reconstruction machine is trustworthy. Special kind of secret sharing schemes are Visual Cryptography Schemes (VCS). In this paper, we analyze visual cryptography schemes with veto capabilities in which the reconstruction of black pix...
متن کاملOn the Pixel Expansion of Hypergraph Access Structures in Visual Cryptography Schemes
In a visual cryptography scheme, a secret image is encoded into n shares, in the form of transparencies. The shares are then distributed to n participants. Qualified subsets of participants can recover the secret image by superimposing their transparencies, but non-qualified subsets of participants have no information about the secret image. Pixel expansion, which represents the number of subpi...
متن کاملNew visual secret sharing schemes using probabilistic method
Visual secret sharing (VSS) scheme is a perfect secure method that protects a secret image by breaking it into shadow images (called shadows). Unlike other threshold schemes, VSS scheme can be easily decoded by the human visual system without the knowledge of cryptography and cryptographic computations. However, the size of shadow images (i.e., the number of columns of the black and white matri...
متن کاملVisual cryptography for grey level images
Visual cryptography is a cryptographic paradigm introduced by Naor and Shamir [Lecture Notes in Comput. Sci., Vol. 950, Springer, Berlin, 1995, p. 1]. Some predefined set of participants can decode a secret message (a black and white image) without any knowledge of cryptography and without performing any cryptographic computation: Their visual system will decode the message. In this paper we de...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Computers & Graphics
دوره 22 شماره
صفحات -
تاریخ انتشار 1998