XOR-based Visual Cryptography Schemes

被引:0
|
作者
P. Tuyls
H. D. L. Hollmann
J. H. Van Lint
L. Tolhuizen
机构
[1] Philips Research Laboratories,Department of Mathematics and Computer Science
[2] Eindhoven University of Technology,undefined
来源
Designs, Codes and Cryptography | 2005年 / 37卷
关键词
Threshold visual secret sharing schemes; XOR; MDS codes;
D O I
暂无
中图分类号
学科分类号
摘要
A recent publication introduced a Visual Crypto (VC) system, based on the polarisation of light. This VC system has goodresolution, contrast and colour properties.Mathematically, the VC system is described by the XOR operation (modulo two addition). In this paper we investigate Threshold Visual Secret Sharing schemes associated to XOR-based VC systems. Firstly, we show that n out of n schemes with optimal resolution and contrast exist, and that (2,n) schemes are equivalent to binary codes. It turns out that these schemes have much better resolution than their OR-based counterparts. Secondly, we provide two explicit constructions for general k out of n schemes. Finally, we derive bounds on the contrast and resolution of XOR-based schemes. It follows from these bounds that for k<n, the contrast is strictly smaller than one. Moreover, the bounds imply that XOR-based k out of n schemes for even k are fundamentally different from those for odd k.
引用
收藏
页码:169 / 186
页数:17
相关论文
共 50 条
  • [21] Visual Cryptography and Image Processing Based Approach for Secure Transactions in Banking Sector
    Jain, Aaditya
    Soni, Sourabh
    2017 2ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATION AND NETWORKS (TEL-NET), 2017, : 301 - 305
  • [22] High-fidelity decryption technology of Visual Cryptography based on optical coherence operation
    Ma, Xiuhao
    Song, Binbin
    Lin, Wei
    Wu, Jixuan
    Huang, Wei
    Liu, Bo
    RESULTS IN PHYSICS, 2022, 43
  • [23] XVC scheme-based secret sharing model with hybrid optimization algorithm for visual cryptography
    Kumar, Manoj
    Shekhar, Shashi
    SIGNAL IMAGE AND VIDEO PROCESSING, 2024, 18 (SUPPL 1) : 309 - 323
  • [24] Generalized Random Grid and Its Applications in Visual Cryptography
    Wu, Xiaotian
    Sun, Wei
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (09) : 1541 - 1553
  • [25] Sharing a Secret Image with Encapsulated Shares in Visual Cryptography
    Shankar, K.
    Eswaran, P.
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON ECO-FRIENDLY COMPUTING AND COMMUNICATION SYSTEMS, 2015, 70 : 462 - 468
  • [26] Multiple Secret Image Communication Using Visual Cryptography
    Blesswin, A. John
    Mary, G. Selva
    Kumar, S. Manoj
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 122 (04) : 3085 - 3103
  • [27] Reducing Protocol Analysis with XOR to the XOR-Free Case in the Horn Theory Based Approach
    Kuesters, Ralf
    Truderung, Tomasz
    JOURNAL OF AUTOMATED REASONING, 2011, 46 (3-4) : 325 - 352
  • [28] Reducing Protocol Analysis with XOR to the XOR-Free Case in the Horn Theory Based Approach
    Ralf Küsters
    Tomasz Truderung
    Journal of Automated Reasoning, 2011, 46 : 325 - 352
  • [29] A Novel Color Multi-Secret Visual Cryptography Scheme
    Sun, Rui
    Fu, Zhengxin
    Yu, Bin
    Huang, Hangying
    AIPR 2020: 2020 3RD INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND PATTERN RECOGNITION, 2020, : 140 - 144
  • [30] All Optical XOR Gate Based on Polarization Rotation
    Gao, Kaiqiang
    Sheng, Xinzhi
    Wu, Chongqing
    Feng, Zhen
    Mao, Yaya
    PROCEEDINGS OF 2010 CROSS-STRAIT CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY, 2010, : 631 - 634