Evolution of Visual Cryptography Basis Matrices with Binary Chromosomes

被引:0
作者
Buckley, Neil [1 ]
Nagar, Atulya [1 ]
Arumugam, Subramanian [2 ]
机构
[1] Liverpool Hope Univ, Dept Math & Comp Sci, Liverpool, Merseyside, England
[2] Kalasalingam Univ, Natl Ctr Adv Res Discrete Math, Krishnankoil 626126, Tamil Nadu, India
来源
2013 8TH EUROSIM CONGRESS ON MODELLING AND SIMULATION (EUROSIM) | 2013年
关键词
visual cryptography; evolutionary computation; genetic algorithms; secret sharing; security; SCHEMES;
D O I
10.1109/EUROSIM.2013.12
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Visual cryptography is a form of secret sharing requiring only human vision to decrypt a secret image, based on the stacking of seemingly random shadow images, or "shares". The main optimization metrics are pixel expansion and recovered image contrast. Maximization of the latter is crucial, as it determines the quality of the decrypted secret. This paper proposes genetic algorithms to evolve basis matrices striving for maximal contrast. They are encoded as binary chromosomes and an objective function is proposed to evaluate their respective fitness values. Evidence for the optimality of GA parameters is demonstrated experimentally, and the success this approach is shown with up to four shares. Furthermore, the algorithm is extended to a generalized graph access for comparison with other research, and the security of this method is analyzed and confirmed.
引用
收藏
页码:7 / 12
页数:6
相关论文
共 13 条
[1]  
Arumugam S., 2012, K N VISUAL CRYPTOGRA, P1
[2]  
Ateniese G., 1996, CONSTRUCTIONS BOUNDS, P1
[3]  
Ching-Nung Yang, 2011, Journal of Electronic Science and Technology, V9, P317, DOI 10.3969/j.issn.1674-862X.2011.04.007
[4]  
Gupta R., 2012, INT J ELECT COMPUTER, P794
[5]  
Haibo Zhang, 2009, Journal of Multimedia, V4, P104
[6]  
Haupt R.L., 2004, PRACTICAL GENETIC AL, p[21, 137]
[7]   Contrast-optimal k out of n secret sharing schemes in visual cryptography [J].
Hofmeister, T ;
Krause, M ;
Simon, HU .
THEORETICAL COMPUTER SCIENCE, 2000, 240 (02) :471-485
[8]  
Hsu CS, 2006, LECT NOTES ARTIF INT, V4203, P58
[9]  
Monoth Thomas, 2009, International Journal of Recent Trends in Engineering, V1, P468
[10]  
Naor M., 1997, Security Protocols. International Workshop Proceedings, P197