Maximizing Contrast in XOR-Based Visual Cryptography Schemes

被引:0
作者
Jia, Xingxing [1 ]
Yu, Ting [1 ]
Luo, Xiangyang [2 ]
Wang, Daoshun [3 ]
Zhou, Huiyu [4 ]
机构
[1] Lanzhou Univ, Sch Math & Stat, Lanzhou 730000, Gansu, Peoples R China
[2] Zhengzhou Informat Sci & Technol Inst, State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Henan, Peoples R China
[3] Tsinghua Univ, Sch Comp, Beijing 100084, Peoples R China
[4] Univ Leicester, Sch Comp & Math Sci, Leicester LE1 7RH, England
基金
中国国家自然科学基金;
关键词
Visualization; Linear programming; Image reconstruction; Circuits and systems; Vectors; Encryption; Computational complexity; Visual cryptography; pixel expansion; XOR operation; general access structure; contrast;
D O I
10.1109/TCSVT.2024.3435724
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Visual cryptography (VC) schemes provide a distinguished image encryption technique to protect image security since it can visually decrypt the secret image by superimposing the encrypted shadows. VC schemes for both threshold access structures and general access structures are generally constructed based on the OR operation to minimize the pixel expansion. However, VC schemes with optimal pixel expansion typically have low contrast. Stacking operation OR frequently produces recovered images with poor visual quality and are never able to deliver flawless recovery for secret images. Therefore, we studied XOR-based VC (XVC) schemes that employ linear programming to maximize their contrast. Three schemes for general access structures and three schemes for threshold access structures are designed to maximize their contrast. The proposed schemes' construction is reduced to a linear programming to maximize the contrast by determining the ideal combinations of basis matrices in terms of primary column matrices and unit matrices, respectively. The comparison study and experimental results demonstrate that the contrast of the previous VC and XVC schemes can be further improved.
引用
收藏
页码:12849 / 12861
页数:13
相关论文
共 50 条
[41]   Optimal Contrast Grayscale Visual Cryptography Schemes With Reversing [J].
Wang, Dao-Shun ;
Song, Tao ;
Dong, Lin ;
Yang, Ching-Nung .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (12) :2059-2072
[42]   Compatible ideal contrast visual cryptography schemes with reversing [J].
Hu, CM ;
Tzeng, WG .
INFORMATION SECURITY, PROCEEDINGS, 2005, 3650 :300-313
[43]   Two kinds of Ideal Contrast Visual Cryptography Schemes [J].
Tan, Xiao-qing .
PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING SYSTEMS, 2009, :450-453
[44]   XOR-based visual secret sharing scheme using pixel vectorization [J].
Suresh Prasad Kannojia ;
Jasvant Kumar .
Multimedia Tools and Applications, 2021, 80 :14609-14635
[45]   A Verifiable Visual Cryptography Scheme Based on XOR Algorithm [J].
Han, Yanyan ;
Dong, Haocong ;
He, Wencai ;
Liu, Juan .
PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, :673-677
[46]   Contrast-Enhanced Visual Cryptography Schemes Based on Additional Pixel Patterns [J].
Monoth, Thomas ;
Anto, Babu P. .
2010 INTERNATIONAL CONFERENCE ON CYBERWORLDS (CW 2010), 2010, :171-178
[47]   Contrast-enhanced visual cryptography schemes based on block pixel patterns [J].
Jisha T.E. ;
Monoth T. .
International Journal of Information Technology, 2023, 15 (5) :2445-2455
[48]   Verifiable XOR-based visual secret sharing scheme for hyperspectral images [J].
Srujana, Oruganti Sai ;
Mhala, Nikhil C. ;
Pais, Alwyn R. .
JOURNAL OF APPLIED REMOTE SENSING, 2021, 15 (01)
[49]   Optimization of XOR Visual Cryptography Scheme [J].
Shi, Lin ;
Yu, Bin .
2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, :297-301
[50]   HOW TO CONSTRUCT PROGRESSIVE VISUAL CRYPTOGRAPHY SCHEMES [J].
Wang, Wenjuan ;
Fujita, Hachiro .
2015 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING (ICASSP), 2015, :1772-1776