Contrast optimal threshold visual cryptography schemes

被引:106
作者
Blundo, C [1 ]
D'Arco, P
De Santis, A
Stinson, DR
机构
[1] Univ Salerno, Dipartimento Informat & Applicaz, I-84081 Baronissi, SA, Italy
[2] Univ Waterloo, Dept Combinator & Optimizat, Waterloo, ON N2L 3G1, Canada
[3] Univ Waterloo, Sch Comp Sci, Waterloo, ON N2L 3G1, Canada
关键词
visual cryptography; secret sharing schemes;
D O I
10.1137/S0895480198336683
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
A (k, n)-threshold visual cryptography scheme (VCS) is a method to encode a secret image SI into n shadow images called shares such that any k or more shares enable the "visual" recovery of the secret image. However, by inspecting less than k shares one cannot gain any information on the secret image. The "visual" recovery consists of copying the shares onto transparencies and then stacking them. Any k shares will reveal the secret image without any cryptographic computation. In this paper we analyze the contrast of the reconstructed image for a (k, n)-threshold VCS. We define a canonical form for a ( k, n)-threshold VCS and provide a characterization of a ( k, n)-threshold VCS. We completely characterize a contrast optimal (n- 1, n)-threshold VCS in canonical form. Moreover, for n greater than or equal to 4, we provide a contrast optimal ( 3, n)-threshold VCS in canonical form. We first describe a family of (3, n)-threshold VCS achieving various values of contrast and pixel expansion. Then we prove an upper bound on the contrast of any (3, n)-threshold VCS and show that a scheme in the described family has optimal contrast. Finally, for k = 4, 5 we present two schemes with contrast asymptotically equal to 1/64 and 1/256, respectively.
引用
收藏
页码:224 / 261
页数:38
相关论文
共 16 条
[1]  
[Anonymous], 1988, CONCRETE MATH FDN CO
[2]   Visual cryptography for general access structures [J].
Ateniese, G ;
Blundo, C ;
DeSantis, A ;
Stinson, DR .
INFORMATION AND COMPUTATION, 1996, 129 (02) :86-106
[3]   Extended capabilities for visual cryptography [J].
Ateniese, G ;
Blundo, C ;
De Santis, A ;
Stinson, DR .
THEORETICAL COMPUTER SCIENCE, 2001, 250 (1-2) :143-161
[4]  
Ateniese G., 1996, LNCS, V1099, P416
[5]  
BIHAM E, 1997, WEIZM WORKSH CRYPT W
[6]   On the contrast in visual cryptography schemes [J].
Blundo, C ;
De Santis, A ;
Stinson, DR .
JOURNAL OF CRYPTOLOGY, 1999, 12 (04) :261-289
[7]  
De Bonis A, 2000, LECT NOTES COMPUT SC, V1770, P626
[8]  
Droste S., 1996, Advances in Cryptology - CRYPTO'96. 16th Annual International Cryptology Conference. Proceedings, P401
[9]  
HOFMEISTER T, 1997, LECT NOTES COMPUTER, V1276, P176
[10]  
NACCACHE D, 1994, COD INF INT FRENCH I