XOR-based Visual Cryptography Schemes

被引:0
|
作者
P. Tuyls
H. D. L. Hollmann
J. H. Van Lint
L. Tolhuizen
机构
[1] Philips Research Laboratories,Department of Mathematics and Computer Science
[2] Eindhoven University of Technology,undefined
来源
Designs, Codes and Cryptography | 2005年 / 37卷
关键词
Threshold visual secret sharing schemes; XOR; MDS codes;
D O I
暂无
中图分类号
学科分类号
摘要
A recent publication introduced a Visual Crypto (VC) system, based on the polarisation of light. This VC system has goodresolution, contrast and colour properties.Mathematically, the VC system is described by the XOR operation (modulo two addition). In this paper we investigate Threshold Visual Secret Sharing schemes associated to XOR-based VC systems. Firstly, we show that n out of n schemes with optimal resolution and contrast exist, and that (2,n) schemes are equivalent to binary codes. It turns out that these schemes have much better resolution than their OR-based counterparts. Secondly, we provide two explicit constructions for general k out of n schemes. Finally, we derive bounds on the contrast and resolution of XOR-based schemes. It follows from these bounds that for k<n, the contrast is strictly smaller than one. Moreover, the bounds imply that XOR-based k out of n schemes for even k are fundamentally different from those for odd k.
引用
收藏
页码:169 / 186
页数:17
相关论文
共 50 条
  • [31] Images encryption algorithm based on the quaternion multiplication and the XOR operation
    Mohamed Boussif
    Noureddine Aloui
    Adnene Cherif
    Multimedia Tools and Applications, 2019, 78 : 35493 - 35510
  • [32] Design of Ultra-High Throughput and Resource Efficiency TRNG Based on NAND-XOR and Feedback XOR Ring Oscillators
    Wang, Junjun
    Huang, Zhao
    Gao, Hongxu
    Zhou, Jia
    Wang, Quan
    8TH INTERNATIONAL TEST CONFERENCE IN ASIA, ITC-ASIA 2024, 2024,
  • [33] A New k out of n Secret Image Sharing Scheme in Visual Cryptography
    Shankar, K.
    Eswaran, P.
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO'16), 2016,
  • [34] Images encryption algorithm based on the quaternion multiplication and the XOR operation
    Boussif, Mohamed
    Aloui, Noureddine
    Cherif, Adnene
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (24) : 35493 - 35510
  • [35] XNOR/XOR graphene logic gate based on plasma disperison effect
    Li, Zhiquan
    Han, Xue
    Xie, Ruijie
    Wang, Ziguang
    Guo, Shiliang
    Wei, Wenjing
    Li, Xin
    SUPERLATTICES AND MICROSTRUCTURES, 2020, 139
  • [36] Two Memristors-Based XOR Logic Demonstrated With Encryption/Decryption
    Song, Yujie
    Wu, Qiwen
    Wang, Xingsheng
    Wang, Chengxu
    Miao, Xiangshui
    IEEE ELECTRON DEVICE LETTERS, 2021, 42 (09) : 1398 - 1401
  • [37] A Lock and Key Share (2, m, n) Random Grid Visual Secret Sharing Scheme with XOR and OR Decryptions
    Ahammed, T. Farzin
    Mundekkattil, Sulaiman
    COMPUTATIONAL INTELLIGENCE, CYBER SECURITY AND COMPUTATIONAL MODELS, ICC3 2015, 2016, 412 : 393 - 402
  • [38] Fingerprint Template Protection Algorithm Based on Bit String XOR and Scrambling Transformation
    Dang L.
    Zhang X.-F.
    Hui Y.
    Zidonghua Xuebao/Acta Automatica Sinica, 2020, 46 (12): : 2681 - 2689
  • [39] On the solution of the XOR problem using the decision tree-based neural network
    Li, AJ
    Liu, YH
    Luo, SW
    2003 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-5, PROCEEDINGS, 2003, : 1048 - 1052
  • [40] CMOS-Based Single-Cycle in-Memory XOR/XNOR
    Alam, Shamiul
    Hutchins, Jack
    Shukla, Nikhil
    Asifuzzaman, Kazi
    Aziz, Ahmedullah
    IEEE ACCESS, 2024, 12 : 49528 - 49534