Sharing multiple secrets in visual cryptography

被引:152
|
作者
Shyu, Shyong Jian [1 ]
Huang, Shih-Yu
Lee, Yeuan-Kuen
Wang, Ran-Zan
Chen, Kun
机构
[1] Ming Chuan Univ, Dept Comp Sci & Informat Engn, Tao Yuan 333, Taiwan
[2] Ming Chuan Univ, Dept Comp & Communicat Engn, Tao Yuan 333, Taiwan
关键词
secret sharing; visual cryptography; visual multi-secret sharing;
D O I
10.1016/j.patcog.2007.03.012
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The secret sharing schemes in conventional visual cryptography are characterized by encoding one shared secret into a set of random transparencies which reveal the secret to the human visual system when they are superimposed. In this paper, we propose a visual secret sharing scheme that encodes a set of x >= 2 secrets into two circle shares such that none of any single share leaks the secrets and the x secrets can be obtained one by one by stacking the first share and the rotated second shares with x different rotation angles. This is the first true result that discusses the sharing ability in visual cryptography up to any general number of multiple secrets in two circle shares. (c) 2007 Pattern Recognition Society. Published by Elsevier Ltd. All rights reserved.
引用
收藏
页码:3633 / 3651
页数:19
相关论文
共 50 条
  • [21] Quality Enhancement of Visual Cryptography for Secret Sharing of Binary, Gray and Color Images
    Chaturvedi, Ratnesh N.
    Thepade, Sudeep D.
    Ahirrao, Swati N.
    2018 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2018,
  • [22] Special type of circular visual cryptography for multiple secret hiding
    Hsu, H-C
    Chen, J.
    Chen, T-S
    Lin, Y-H
    IMAGING SCIENCE JOURNAL, 2007, 55 (03) : 175 - 179
  • [23] A (2,2) Secret Sharing Scheme for Visual Cryptography without Pixel Expansion
    Hodeish, Mahmoud E.
    Humbe, V. T.
    2015 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, SIGNALS, COMMUNICATION AND OPTIMIZATION (EESCO), 2015,
  • [24] Secret Information Sharing Using Extended Color Visual Cryptography
    Sharma, Shivam
    Modi, Shivam
    Sharma, Akanksha
    COMPUTING AND NETWORK SUSTAINABILITY, 2017, 12 : 403 - 412
  • [25] Extended Visual Cryptography Scheme for Multi-secret Sharing
    Reddy, L. Siva
    Prasad, Munaga V. N. K.
    PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND INFORMATICS, ICACNI 2015, VOL 2, 2016, 44 : 249 - 257
  • [26] Secret Sharing and Multi-user Authentication: From Visual Cryptography to RRAM Circuits
    Arafin, Md Tanvir
    Qu, Gang
    2016 INTERNATIONAL GREAT LAKES SYMPOSIUM ON VLSI (GLSVLSI), 2016, : 169 - 174
  • [27] Secure Medical Image-Sharing Mechanism based on Visual Cryptography in EHR system
    Yang, Dana
    Doh, Inshil
    Chae, Kijoon
    2018 20TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2018, : 463 - 467
  • [28] HIDING MULTIPLE WATERMARKS IN TRANSPARENCIES OF VISUAL CRYPTOGRAPHY
    Luo, Hao
    Yu, Fa-Xin
    Chu, Shu-Chuan
    Lu, Zhe-Ming
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (07): : 1875 - 1881
  • [29] Sharing visual multi-secrets using circle shares
    Wu, HC
    Chang, CC
    COMPUTER STANDARDS & INTERFACES, 2005, 28 (01) : 123 - 135
  • [30] Sharing Visual Secrets in Single Image Random Dot Stereograms
    Lee, Kai-Hui
    Chiu, Pei-Ling
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2014, 23 (10) : 4336 - 4347