Some Extensions on Threshold Visual Cryptography Schemes

被引:21
作者
Liu, Feng [1 ,2 ]
Wu, ChuanKun [1 ]
Lin, XiJun [3 ]
机构
[1] Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100190, Peoples R China
[2] Chinese Acad Sci, Grad Univ, Beijing 100190, Peoples R China
[3] Ocean Univ China, Dept Comp Sci & Technol, Qingdao 266100, Peoples R China
关键词
information security; visual cryptography; threshold; concolorous; CONTRAST;
D O I
10.1093/comjnl/bxn072
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Droste [CRYPTO'96] proposed a construction of threshold visual cryptography scheme (TVCS) under the visual cryptography model of Naor and Shamir, i.e. the visual cryptography model with the underlying operation OR. In this article, we give three extensions of TVCS. First, we prove that the TVCS proposed by Droste which was based on the OR operation is still a valid TVCS under the XOR operation, and then we propose a method to further reduce its pixel expansion. We then propose an interesting construction of TVCS with all shares being concolorous. Finally, we give a construction of threshold extended visual cryptography scheme (TEVCS) with the underlying operation OR or XOR. All of our schemes can be applied to the visual cryptography model introduced by Tuyls et al. (First Int. Conf. Security in Pervasive Computing 2004, International Patent with Application No.: PCT/IB2003/000261).
引用
收藏
页码:107 / 119
页数:13
相关论文
共 25 条
[1]   Visual cryptography for general access structures [J].
Ateniese, G ;
Blundo, C ;
DeSantis, A ;
Stinson, DR .
INFORMATION AND COMPUTATION, 1996, 129 (02) :86-106
[2]   Extended capabilities for visual cryptography [J].
Ateniese, G ;
Blundo, C ;
De Santis, A ;
Stinson, DR .
THEORETICAL COMPUTER SCIENCE, 2001, 250 (1-2) :143-161
[3]  
BIHAM E, 1997, RUMP SESS CRYPTO 98
[4]   On the contrast in visual cryptography schemes [J].
Blundo, C ;
De Santis, A ;
Stinson, DR .
JOURNAL OF CRYPTOLOGY, 1999, 12 (04) :261-289
[5]   Contrast optimal threshold visual cryptography schemes [J].
Blundo, C ;
D'Arco, P ;
De Santis, A ;
Stinson, DR .
SIAM JOURNAL ON DISCRETE MATHEMATICS, 2003, 16 (02) :224-261
[6]   An image intellectual property protection scheme for gray-level images using visual secret sharing strategy [J].
Chang, CC ;
Chuang, JC .
PATTERN RECOGNITION LETTERS, 2002, 23 (08) :931-941
[7]   Probabilistic visual cryptography schemes [J].
Cimato, S ;
De Prisco, R ;
De Santis, A .
COMPUTER JOURNAL, 2006, 49 (01) :97-107
[8]   Ideal contrast visual cryptography schemes with reversing [J].
Cimato, S ;
De Santis, A ;
Ferrara, AL ;
Masucci, B .
INFORMATION PROCESSING LETTERS, 2005, 93 (04) :199-206
[9]  
Droste S., 1996, Advances in Cryptology - CRYPTO'96. 16th Annual International Cryptology Conference. Proceedings, P401
[10]  
HOFMEISTER T, 1997, LECT NOTES COMPUTER, V1276, P176