Contrast optimal threshold visual cryptography schemes

被引:103
作者
Blundo, C [1 ]
D'Arco, P
De Santis, A
Stinson, DR
机构
[1] Univ Salerno, Dipartimento Informat & Applicaz, I-84081 Baronissi, SA, Italy
[2] Univ Waterloo, Dept Combinator & Optimizat, Waterloo, ON N2L 3G1, Canada
[3] Univ Waterloo, Sch Comp Sci, Waterloo, ON N2L 3G1, Canada
关键词
visual cryptography; secret sharing schemes;
D O I
10.1137/S0895480198336683
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
A (k, n)-threshold visual cryptography scheme (VCS) is a method to encode a secret image SI into n shadow images called shares such that any k or more shares enable the "visual" recovery of the secret image. However, by inspecting less than k shares one cannot gain any information on the secret image. The "visual" recovery consists of copying the shares onto transparencies and then stacking them. Any k shares will reveal the secret image without any cryptographic computation. In this paper we analyze the contrast of the reconstructed image for a (k, n)-threshold VCS. We define a canonical form for a ( k, n)-threshold VCS and provide a characterization of a ( k, n)-threshold VCS. We completely characterize a contrast optimal (n- 1, n)-threshold VCS in canonical form. Moreover, for n greater than or equal to 4, we provide a contrast optimal ( 3, n)-threshold VCS in canonical form. We first describe a family of (3, n)-threshold VCS achieving various values of contrast and pixel expansion. Then we prove an upper bound on the contrast of any (3, n)-threshold VCS and show that a scheme in the described family has optimal contrast. Finally, for k = 4, 5 we present two schemes with contrast asymptotically equal to 1/64 and 1/256, respectively.
引用
收藏
页码:224 / 261
页数:38
相关论文
共 16 条
  • [1] [Anonymous], 1988, CONCRETE MATH FDN CO
  • [2] Visual cryptography for general access structures
    Ateniese, G
    Blundo, C
    DeSantis, A
    Stinson, DR
    [J]. INFORMATION AND COMPUTATION, 1996, 129 (02) : 86 - 106
  • [3] Extended capabilities for visual cryptography
    Ateniese, G
    Blundo, C
    De Santis, A
    Stinson, DR
    [J]. THEORETICAL COMPUTER SCIENCE, 2001, 250 (1-2) : 143 - 161
  • [4] Ateniese G., 1996, LNCS, V1099, P416
  • [5] BIHAM E, 1997, WEIZM WORKSH CRYPT W
  • [6] On the contrast in visual cryptography schemes
    Blundo, C
    De Santis, A
    Stinson, DR
    [J]. JOURNAL OF CRYPTOLOGY, 1999, 12 (04) : 261 - 289
  • [7] De Bonis A, 2000, LECT NOTES COMPUT SC, V1770, P626
  • [8] Droste S., 1996, Advances in Cryptology - CRYPTO'96. 16th Annual International Cryptology Conference. Proceedings, P401
  • [9] HOFMEISTER T, 1997, LECT NOTES COMPUTER, V1276, P176
  • [10] NACCACHE D, 1994, COD INF INT FRENCH I