A new black and white visual cryptographic scheme for general access structures

被引:0
作者
Adhikari, A
Dutta, TK
Roy, B
机构
[1] Indian Stat Inst, Appl Stat Unit, Kolkata 700035, W Bengal, India
[2] Indian Stat Inst, SQC Unit, Kolkata 700035, W Bengal, India
来源
PROGRESS IN CRYPTOLOGY - INDOCRYPT 2004, PROCEEDINGS | 2004年 / 3348卷
关键词
secret sharing scheme; visual secret sharing scheme; visual cryptography; visual threshold; scheme; general access structure;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper we introduce a new construction of a black and white visual cryptographic scheme for general access structure. We prove that our scheme gives a strong access structure. We find out the conditions for which our scheme gives less pixel expansion compared to the schemes given in Section 4.2 of [1]. We also propose a modified algorithm giving better result from the pixel expansion's point of view. As a particular case of general access structure, we get (k, n)-VTS with 2 less than or equal to k < n. The (n, n)-VTS obtained from our scheme attains the optimal pixel expansion and the relative contrast. We compare the (k, n)-VTS obtained from the schemes mentioned in Section 4.1 and Section 4.2 of [1] with the (k, n)-VTS obtained from our method and it has been shown that in almost all the cases our pixel expansion is less compared to the other two schemes.
引用
收藏
页码:399 / 413
页数:15
相关论文
共 12 条
  • [1] Visual cryptography for general access structures
    Ateniese, G
    Blundo, C
    DeSantis, A
    Stinson, DR
    [J]. INFORMATION AND COMPUTATION, 1996, 129 (02) : 86 - 106
  • [2] Ateniese G., 1996, LNCS, V1099, P416
  • [3] EFFICIENT GENERATION OF BINARY REFLECTED GRAY CODE AND ITS APPLICATIONS
    BITNER, JR
    EHRLICH, G
    REINGOLD, EM
    [J]. COMMUNICATIONS OF THE ACM, 1976, 19 (09) : 517 - 521
  • [4] On the contrast in visual cryptography schemes
    Blundo, C
    De Santis, A
    Stinson, DR
    [J]. JOURNAL OF CRYPTOLOGY, 1999, 12 (04) : 261 - 289
  • [5] Visual cryptography for grey level images
    Blundo, C
    De Santis, A
    Naor, M
    [J]. INFORMATION PROCESSING LETTERS, 2000, 75 (06) : 255 - 259
  • [6] Droste S., 1996, Advances in Cryptology - CRYPTO'96. 16th Annual International Cryptology Conference. Proceedings, P401
  • [7] KOGA H, 1998, IEICE T FUNDAMEN E A, V81
  • [8] KOGA H, 2001, IEICE T FUNDAMEN E A, V84
  • [9] KOGA H, 2002, IEICE T FUNDAMEN E A, V85
  • [10] MacPherson L., 2002, THESIS U WATERLOO