XOR-based region incrementing visual cryptography scheme with share block construction

被引:0
作者
Yu, Bin [1 ]
Hu, Hao [1 ]
Chen, Wu-Ping [2 ]
Shen, Gang [1 ]
机构
[1] Information Engineering University, Zhengzhou
[2] Science and Technology on Information Assurance Laboratory, Beijing
来源
Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology | 2015年 / 37卷 / 08期
关键词
Block construction; Perfect recovery; Region incrementing; Security level; Visual cryptography; XOR operation;
D O I
10.11999/JEIT141385
中图分类号
学科分类号
摘要
By designing the block construction for each share, which is divided into several blocks according to the number of qualified sets, the secret sharing and recovering algorithms of the XOR-based region incrementing visual cryptography are designed with the encoding matrices of the (n,n) XOR-based single secret sharing visual cryptography. Comparing with the existing schemes, the proposed scheme realizes the perfect recovery of decoded regions in secret image, and the sizes of shares are also decreased efficiently. ©, 2015, Science Press. All right reserved.
引用
收藏
页码:1978 / 1983
页数:5
相关论文
共 17 条
[1]  
Fu Z.-X., Yu B., Fang L.-G., A new multi-secret sharing visual cryptography, Acta Electronica Sinica, 39, 3, pp. 712-718, (2011)
[2]  
Fu Z.-X., Yu B., Fang L.-G., The access-based multi-secret visual cryptography with compression algorithm, Journal of Electronics & Information Technology, 35, 5, pp. 1055-1062, (2013)
[3]  
Yu B., Shen G., Multi-secret visual cryptography with deterministic contrast, Multimedia Tools and Applications, 72, 2, pp. 1867-1886, (2014)
[4]  
Shyu S.J., Jiang H.W., General constructions for threshold multiple-secret visual cryptography schemes, IEEE Transactions on Information Forensics Security, 8, 5, pp. 733-743, (2013)
[5]  
Wang R.Z., Region incrementing visual cryptography, IEEE Signal Processing Letters, 16, 8, pp. 659-662, (2009)
[6]  
Shyu S.J., Jiang H.W., Efficient construction for region incrementing visual cryptography, IEEE Transactions on Circuits and Systems for Video Technology, 22, 5, pp. 769-777, (2012)
[7]  
Yang C.N., Shih H.W., Chu Y.Y., Et al., New region incrementing visual cryptography scheme, Proceedings of the International Conference on Image Processing, Computer Vision, and Pattern Recognition in Conjunction with WORLDCOMP, pp. 323-329, (2011)
[8]  
Yang C.N., Shih H.W., Wu C.C., Et al., k out of n region incrementing scheme in visual cryptography, IEEE Transactions on Circuits and Systems for Video Technology, 22, 5, pp. 799-810, (2012)
[9]  
Yang C.N., Lin Y.C., Wu C.C., Region-in-Region incrementing visual cryptography scheme, Proceedings of 12th International Workshop on Digital-Forensics and Watermarking, pp. 449-463, (2013)
[10]  
Chen Y.C., Tsai D.S., Horng G., A new authentication based cheating prevention scheme in Naor-Shamir's visual cryptography, The Journal of Visual Communication and Image Representation, 23, 8, pp. 1225-1233, (2012)