Sharing multiple secrets in visual cryptography

被引:152
作者
Shyu, Shyong Jian [1 ]
Huang, Shih-Yu
Lee, Yeuan-Kuen
Wang, Ran-Zan
Chen, Kun
机构
[1] Ming Chuan Univ, Dept Comp Sci & Informat Engn, Tao Yuan 333, Taiwan
[2] Ming Chuan Univ, Dept Comp & Communicat Engn, Tao Yuan 333, Taiwan
关键词
secret sharing; visual cryptography; visual multi-secret sharing;
D O I
10.1016/j.patcog.2007.03.012
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The secret sharing schemes in conventional visual cryptography are characterized by encoding one shared secret into a set of random transparencies which reveal the secret to the human visual system when they are superimposed. In this paper, we propose a visual secret sharing scheme that encodes a set of x >= 2 secrets into two circle shares such that none of any single share leaks the secrets and the x secrets can be obtained one by one by stacking the first share and the rotated second shares with x different rotation angles. This is the first true result that discusses the sharing ability in visual cryptography up to any general number of multiple secrets in two circle shares. (c) 2007 Pattern Recognition Society. Published by Elsevier Ltd. All rights reserved.
引用
收藏
页码:3633 / 3651
页数:19
相关论文
共 50 条
  • [31] Cheating in visual cryptography
    Horng, G
    Chen, T
    Tsai, D
    DESIGNS CODES AND CRYPTOGRAPHY, 2006, 38 (02) : 219 - 236
  • [32] Halftone visual cryptography
    Zhou, Zhi
    Arce, Gonzalo R.
    Di Crescenzo, Giovanni
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2006, 15 (08) : 2441 - 2453
  • [33] Verifiable Visual Cryptography
    Hsu, Shuo-Fang
    Chang, Yu-Jie
    Wang, Ran-Zan
    Lee, Yeuan-Kuen
    Huang, Shih-Yu
    2012 SIXTH INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING (ICGEC), 2012, : 464 - 467
  • [34] Randomness in visual cryptography
    De Bonis, A
    De Santis, A
    STACS 2000: 17TH ANNUAL SYMPOSIUM ON THEORETICAL ASPECT OF COMPUTER SCIENCE, 2000, 1770 : 626 - 638
  • [35] Cheating in Visual Cryptography
    Gwoboa Horng
    Tzungher Chen
    Du-shiau Tsai
    Designs, Codes and Cryptography, 2006, 38 : 219 - 236
  • [36] AN IMPROVED SECRET SHARING USING XOR-BASED VISUAL CRYPTOGRAPHY
    Purushothaman, Vandana
    Sreedhar, Sreela
    PROCEEDINGS OF 2016 ONLINE INTERNATIONAL CONFERENCE ON GREEN ENGINEERING AND TECHNOLOGIES (IC-GET), 2016,
  • [37] Secured Document Sharing Using Visual Cryptography in Cloud Data Storage
    Brindha, K.
    Jeyanthi, N.
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2015, 15 (04) : 111 - 123
  • [38] Mammograms Multiple Watermarking Scheme Based on Visual Cryptography
    Benyoussef, Meryem
    Mabtoul, Samira
    El Marraki, Mohamed
    Aboutajdine, Driss
    PROCEEDINGS OF THE MEDITERRANEAN CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGIES 2015, VOL 1, 2016, 380 : 445 - 453
  • [39] Multiple Secret Image Communication Using Visual Cryptography
    A. John Blesswin
    G. Selva Mary
    S. Manoj Kumar
    Wireless Personal Communications, 2022, 122 : 3085 - 3103
  • [40] Multiple Secret Image Communication Using Visual Cryptography
    Blesswin, A. John
    Mary, G. Selva
    Kumar, S. Manoj
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 122 (04) : 3085 - 3103