On the Pixel Expansion of Hypergraph Access Structures in Visual Cryptography Schemes

author

  • Abbas Cheraghi
Abstract:

In a visual cryptography scheme, a secret image is encoded into n shares, in the form of transparencies. The shares are then distributed to n participants. Qualified subsets of participants can recover the secret image by superimposing their transparencies, but non-qualified subsets of participants have no information about the secret image. Pixel expansion, which represents the number of subpixels in the encoding of the secret image, should be as small as possible. Optimal schemes are those that have the minimum pixel expansion. In this paper we study the pixel expansion of hypergraph access structures and introduce a number of upper bounds on the pixel expansion of special kinds of access structures. Also we demonstrate the minimum pixel expansion of induced matching hypergraph is sharp when every qualified subset is exactly one edge with odd size. Furthermore we explain that the minimum pixel expansion of every graph access structure $P_{n}$ is exactly $lceil frac{ n+1}{2}rceil$. It indicates the lower bound mentioned in [4] is sharp.

Upgrade to premium to download articles

Sign up to access the full text

Already have an account?login

similar resources

Visual cryptography schemes with optimal pixel expansion

A visual cryptography scheme encodes a black & white secret image into n shadow images called shares which are distributed to the n participants. Such shares are such that only qualified subsets of participants can “visually” recover the secret image. Usually, the reconstructed image will be darker than the background of the image itself. In this paper we consider visual cryptography schemes sa...

full text

Achieving Optimal Contrast in Visual Cryptography Schemes without Pixel Expansion

In this paper we present visual cryptography scheme to encode a black and white image into the same size shares as the secret image. In addition, an improved method for the generation of shares is proposed using additional matrix. Visual cryptography method for encrypting printed texts, handwritten notes, and pictures are done in a perfectly secure way, and decoding these data with the human vi...

full text

Survey of Visual Cryptography Schemes without Pixel Expansion

The basic idea of the Visual Cryptography is to encrypt a secret image into n number of meaningless share images. The Visual Cryptography technique cannot leak the encrypted information of the shared secret by virtue of any combination of the n share images combined together. This share images are printed on separate transparencies and distributed as shares such that, when the share images are ...

full text

Maximal Independent Sets for the Pixel Expansion of Graph Access Structure

 Abstract : A visual cryptography scheme based on a given graph G is a method to distribute a secret image among the vertices of G, the participants, so that a subset of participants can recover the secret image if they contain an edge of G, by stacking their shares, otherwise they can obtain no information regarding the secret image. In this paper a maximal independent sets of the graph G was ...

full text

MAXIMAL INDEPENDENT SETS FOR THE PIXEL EXPANSION OF GRAPH ACCESS STRUCTURE

Given a graph G, a visual cryptography scheme based on the graph G is a method to distribute a secret image among the vertices of G, the participants, so that a subset of participants can recover the secret image if they contain an edge of G, by stacking their shares, otherwise they can obtain no information regarding the secret image. In this paper we apply maximal independent sets of the grap...

full text

Halftone Visual Cryptography with Pixel Expansion through Error Diffusion

Extended Visual Cryptography (EVC) concept provides meaningful shares instead of non meaningful shares. In this paper we proposed an algorithm based on EVC which enhances the contrast of the recovered secret image. Here the size of image visible on shares is taken to be three times as that of secret image, both the images are assumed in grey level. In the proposed algorithm secret image and the...

full text

My Resources

Save resource for easier access later

Save to my library Already added to my library

{@ msg_add @}


Journal title

volume 5  issue None

pages  45- 54

publication date 2010-11

By following a journal you will be notified via email when a new issue of this journal is published.

Keywords

Hosted on Doprax cloud platform doprax.com

copyright © 2015-2023