Probabilistic visual cryptography schemes

被引:161
作者
Cimato, S
De Prisco, R [1 ]
De Santis, A
机构
[1] Univ Salerno, Dipartimento Informat & Applicaz, I-84081 Baronissi, SA, Italy
[2] Univ Milan, Dipartimento Tecnol Informaz, I-26013 Crema, Italy
关键词
visual cryptography; probabilistic schemes; secret sharing;
D O I
10.1093/comjnl/bxh152
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Visual cryptography schemes allow the encoding of a secret image, consisting of black or white pixels, into n shares which are distributed to the participants. The shares are such that only qualified subsets of participants can 'visually' recover the secret image. The secret pixels are shared with techniques that subdivide each secret pixel into a certain number m, m >= 2 of subpixels. Such a parameter m is called pixel expansion. Recently Yang introduced a probabilistic model. In such a model the pixel expansion m is 1, that is, there is no pixel expansion. The reconstruction of the image however is probabilistic, meaning that a secret pixel will be correctly reconstructed only with a certain probability. In this paper we propose a generalization of the model proposed by Yang. In our model we fix the pixel expansion m >= 1 that can be tolerated and we consider probabilistic schemes attaining such a pixel expansion. For m = 1 our model reduces to the one of Yang. For big enough values of m, for which a deterministic scheme exists, our model reduces to the classical deterministic model. We show that between these two extremes one can trade the probability factor of the scheme with the pixel expansion. Moreover, we prove that there is a one-to-one mapping between deterministic schemes and probabilistic schemes with no pixel expansion, where contrast is traded for the probability factor.
引用
收藏
页码:97 / 107
页数:11
相关论文
共 17 条
[1]   Visual cryptography for general access structures [J].
Ateniese, G ;
Blundo, C ;
DeSantis, A ;
Stinson, DR .
INFORMATION AND COMPUTATION, 1996, 129 (02) :86-106
[2]   Extended capabilities for visual cryptography [J].
Ateniese, G ;
Blundo, C ;
De Santis, A ;
Stinson, DR .
THEORETICAL COMPUTER SCIENCE, 2001, 250 (1-2) :143-161
[3]  
Ateniese G., 1996, LNCS, V1099, P416
[4]   On the contrast in visual cryptography schemes [J].
Blundo, C ;
De Santis, A ;
Stinson, DR .
JOURNAL OF CRYPTOLOGY, 1999, 12 (04) :261-289
[5]   Contrast optimal threshold visual cryptography schemes [J].
Blundo, C ;
D'Arco, P ;
De Santis, A ;
Stinson, DR .
SIAM JOURNAL ON DISCRETE MATHEMATICS, 2003, 16 (02) :224-261
[6]   Improved schemes for visual cryptography [J].
Blundo, C ;
Bonis, AD ;
Santis, AD .
DESIGNS CODES AND CRYPTOGRAPHY, 2001, 24 (03) :255-278
[7]   Optimal colored threshold visual cryptography schemes [J].
Cimato, S ;
De Prisco, R ;
De Santis, A .
DESIGNS CODES AND CRYPTOGRAPHY, 2005, 35 (03) :311-335
[8]  
Cimato S., 2004, LNCS, V3352, P236
[9]   Contrast-optimal k out of n secret sharing schemes in visual cryptography [J].
Hofmeister, T ;
Krause, M ;
Simon, HU .
THEORETICAL COMPUTER SCIENCE, 2000, 240 (02) :471-485
[10]   Determining the optimal contrast for secret sharing schemes in visual cryptography [J].
Krause, M ;
Simon, HU .
COMBINATORICS PROBABILITY & COMPUTING, 2003, 12 (03) :285-299