Two kinds of Ideal Contrast Visual Cryptography Schemes

被引:10
作者
Tan, Xiao-qing [1 ]
机构
[1] Jinan Univ, Dept Math, Guangzhou 510632, Guangdong, Peoples R China
来源
PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING SYSTEMS | 2009年
关键词
visual cryptography; exclusive-or(XOR); ideal contrast; binary linear error-correcting code;
D O I
10.1109/ICSPS.2009.119
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The (k, n) visual cryptography schemes (VCS) is a perfect secure method that encrypts a secret image by breaking it into shadow images. A Visual Crypto (VC) system based on the polarisation of light which has good resolution, contrast and color properties is introduced. Mathematically, the VC system is described by the XOR operation, which just mean modulo two addition and is equivalence of addition in the finite field GF(2). In this paper, we investigate threshold visual secret sharing schemes mixed XOR and OR operation with reversing and based on binary linear error-correcting code. Firstly, we show that 2 out of 2 schemes mixed on XOR and OR operation with reversing where the reconstruction of both black and white pixels is perfect. It turns out that scheme have much better resolution than their OR-based counterparts. Secondly, we provide one construction for general k out of n schemes based on binary linear error-correcting code. And we show these two schemes are ideal contrast.
引用
收藏
页码:450 / 453
页数:4
相关论文
共 15 条
[1]   Gentrification or social renewal? Effects of public supported housing renewal in Denmark [J].
Andersen, HS .
SCANDINAVIAN HOUSING & PLANNING RESEARCH, 1998, 15 (03) :111-128
[2]   On the contrast in visual cryptography schemes [J].
Blundo, C ;
De Santis, A ;
Stinson, DR .
JOURNAL OF CRYPTOLOGY, 1999, 12 (04) :261-289
[3]   Ideal contrast visual cryptography schemes with reversing [J].
Cimato, S ;
De Santis, A ;
Ferrara, AL ;
Masucci, B .
INFORMATION PROCESSING LETTERS, 2005, 93 (04) :199-206
[4]  
Droste S., 1996, Advances in Cryptology - CRYPTO'96. 16th Annual International Cryptology Conference. Proceedings, P401
[5]  
Hou YC., 2001, J TECHNOLOGY, V16, P595
[6]  
KARNIN ED, 1983, IEEE T INFORM TH SEP, P644
[7]  
Massey J., 1993, P 6 JOINT SWED RUSS, P276
[8]  
Massey JL., 1995, Codes and Cyphers: Cryptography and Coding IV, P33
[9]  
Naor M., 1995, LECT NOTES COMPUTER, V13, P1, DOI [10.1007/BFb0053419, DOI 10.1007/978-1-4939-9484-7_1, DOI 10.1007/BFB0053419]
[10]  
STINSON DR, 1997, PUBL KEY SOL 97