Sharing multiple secrets in visual cryptography

被引:152
作者
Shyu, Shyong Jian [1 ]
Huang, Shih-Yu
Lee, Yeuan-Kuen
Wang, Ran-Zan
Chen, Kun
机构
[1] Ming Chuan Univ, Dept Comp Sci & Informat Engn, Tao Yuan 333, Taiwan
[2] Ming Chuan Univ, Dept Comp & Communicat Engn, Tao Yuan 333, Taiwan
关键词
secret sharing; visual cryptography; visual multi-secret sharing;
D O I
10.1016/j.patcog.2007.03.012
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The secret sharing schemes in conventional visual cryptography are characterized by encoding one shared secret into a set of random transparencies which reveal the secret to the human visual system when they are superimposed. In this paper, we propose a visual secret sharing scheme that encodes a set of x >= 2 secrets into two circle shares such that none of any single share leaks the secrets and the x secrets can be obtained one by one by stacking the first share and the rotated second shares with x different rotation angles. This is the first true result that discusses the sharing ability in visual cryptography up to any general number of multiple secrets in two circle shares. (c) 2007 Pattern Recognition Society. Published by Elsevier Ltd. All rights reserved.
引用
收藏
页码:3633 / 3651
页数:19
相关论文
共 50 条
  • [41] RGB Based Multiple Share Creation in Visual Cryptography with Aid of Elliptic Curve Cryptography
    Shankar, K.
    Eswaran, P.
    CHINA COMMUNICATIONS, 2017, 14 (02) : 118 - 130
  • [42] Classification of Generalized Graph-type (2,n)-Visual Secret Sharing Schemes and Optimal Construction for Multiple Secrets
    Suga, Yuji
    INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 746 - 755
  • [43] RGB Based Multiple Share Creation in Visual Cryptography with Aid of Elliptic Curve Cryptography
    K.Shankar
    P.Eswaran
    中国通信, 2017, 14 (02) : 118 - 130
  • [44] HIGH CAPACITY MULTI-SCALE IMAGE SHARING SCHEME BY COMBINING VISUAL CRYPTOGRAPHY WITH DATA HIDING
    Zeng, Yi-Chong
    Tsai, Chi-Hung
    2013 20TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP 2013), 2013, : 4536 - 4539
  • [45] Competitive Swarm Improved Invasive Weed Optimization-Based Secret Sharing Scheme for Visual Cryptography
    Choudhary, Arvind Singh
    Kumar, Manoj
    CYBERNETICS AND SYSTEMS, 2024, 55 (01) : 42 - 60
  • [46] An overview of visual cryptography techniques
    Dyala R. Ibrahim
    Je Sen Teh
    Rosni Abdullah
    Multimedia Tools and Applications, 2021, 80 : 31927 - 31952
  • [47] A new approach for visual cryptography
    Tzeng, WG
    Hu, CM
    DESIGNS CODES AND CRYPTOGRAPHY, 2002, 27 (03) : 207 - 227
  • [48] Cheating prevention in visual cryptography
    Hu, Chih-Ming
    Tzeng, Wen-Guey
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2007, 16 (01) : 36 - 45
  • [49] Visual cryptography by use of polarization
    Yamamoto, Hirotsugu
    Imagawa, Takanori
    Suyama, Shiro
    MULTIMEDIA ON MOBILE DEVICES 2010, 2010, 7542
  • [50] Image Hatching for Visual Cryptography
    Weir, Jonathan
    Yan, Wei-Qi
    2009 13TH INTERNATIONAL MACHINE VISION AND IMAGE PROCESSING CONFERENCE, 2009, : 59 - 64