Sharing multiple secrets in visual cryptography

被引:155
作者
Shyu, Shyong Jian [1 ]
Huang, Shih-Yu
Lee, Yeuan-Kuen
Wang, Ran-Zan
Chen, Kun
机构
[1] Ming Chuan Univ, Dept Comp Sci & Informat Engn, Tao Yuan 333, Taiwan
[2] Ming Chuan Univ, Dept Comp & Communicat Engn, Tao Yuan 333, Taiwan
关键词
secret sharing; visual cryptography; visual multi-secret sharing;
D O I
10.1016/j.patcog.2007.03.012
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The secret sharing schemes in conventional visual cryptography are characterized by encoding one shared secret into a set of random transparencies which reveal the secret to the human visual system when they are superimposed. In this paper, we propose a visual secret sharing scheme that encodes a set of x >= 2 secrets into two circle shares such that none of any single share leaks the secrets and the x secrets can be obtained one by one by stacking the first share and the rotated second shares with x different rotation angles. This is the first true result that discusses the sharing ability in visual cryptography up to any general number of multiple secrets in two circle shares. (c) 2007 Pattern Recognition Society. Published by Elsevier Ltd. All rights reserved.
引用
收藏
页码:3633 / 3651
页数:19
相关论文
共 11 条
[1]   Visual cryptography for general access structures [J].
Ateniese, G ;
Blundo, C ;
DeSantis, A ;
Stinson, DR .
INFORMATION AND COMPUTATION, 1996, 129 (02) :86-106
[2]   On the contrast in visual cryptography schemes [J].
Blundo, C ;
De Santis, A ;
Stinson, DR .
JOURNAL OF CRYPTOLOGY, 1999, 12 (04) :261-289
[3]   Visual cryptography for color images [J].
Hou, YC .
PATTERN RECOGNITION, 2003, 36 (07) :1619-1629
[4]   Visual cryptography for gray-level images by dithering techniques [J].
Lin, CC ;
Tsai, WH .
PATTERN RECOGNITION LETTERS, 2003, 24 (1-3) :349-358
[5]  
Naor M, 1997, LECT NOTES COMPUT SC, V1294, P322
[6]  
Naor M., 1995, LECT NOTES COMPUTER, P1, DOI DOI 10.1007/BFB0053419
[7]   Efficient visual secret sharing scheme for color images [J].
Shyu, SH .
PATTERN RECOGNITION, 2006, 39 (05) :866-880
[8]  
STINSON DR, 1997, PUBL KEY SOL 97 TOR
[9]   Constructions and Properties of k out of n Visual Secret Sharing Schemes [J].
Verheul E.R. ;
Van Tilborg H.C.A. .
Designs, Codes and Cryptography, 1997, 11 (2) :179-196
[10]  
WU CC, 1998, THESIS NATL C TUNG U