Improved schemes for visual cryptography

被引:103
作者
Blundo, C [1 ]
Bonis, AD [1 ]
Santis, AD [1 ]
机构
[1] Univ Salerno, Dipartimento Informat & Applicaz, I-84081 Baronissi, SA, Italy
关键词
visual cryptography; contrast; pixel expansion;
D O I
10.1023/A:1011271120274
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A (k, n)-threshold visual cryptography scheme ((k, n)-threshold VCS, for short) is a method to encode a secret image SI into n shadow images called shares such that any k or more shares enable the "visual" recovery of the secret image, but by inspecting less than k shares one cannot gain any information on the secret image. The "visual" recovery consists of xeroxing the shares onto transparencies, and then stacking them. Any k shares will reveal the secret image without any cryptographic computation. In this paper we analyze visual cryptography schemes in which the reconstruction of black pixels is perfect, that is, all the subpixels associated to a black pixel are black. For any value of k and n, where 2 less than or equal to k less than or equal to n, we give a construction for (k,n)-threshold VCS which improves on the best previously known constructions with respect to the pixel expansion (i.e., the number of subpixels each pixel of the original image is encoded into). We also provide a construction for coloured (2, n)-threshold VCS and for coloured (n, n)-threshold VCS. Both constructions improve on the best previously known constructions with respect to the pixel expansion.
引用
收藏
页码:255 / 278
页数:24
相关论文
共 14 条
[1]  
[Anonymous], 1988, CONCRETE MATH FDN CO
[2]   Visual cryptography for general access structures [J].
Ateniese, G ;
Blundo, C ;
DeSantis, A ;
Stinson, DR .
INFORMATION AND COMPUTATION, 1996, 129 (02) :86-106
[3]  
Ateniese G., 1996, LNCS, V1099, P416
[4]  
BLUNDO C, 1999, J COMPUTERS GRAPHICS, V22, P449
[5]  
BLUNDO C, 2000, IN PRESS SIAM J DISC
[6]  
BLUNDO C, 1999, J CRYPTOL, V12, P73
[7]  
De Bonis A, 2000, LECT NOTES COMPUT SC, V1770, P626
[8]  
Droste S., 1996, Advances in Cryptology - CRYPTO'96. 16th Annual International Cryptology Conference. Proceedings, P401
[9]  
HOFMEISTER T, 1997, LECT NOTES COMPUTER, V1276, P176
[10]  
Naor M., 1995, LECT NOTES COMPUTER, P1, DOI DOI 10.1007/BFB0053419