Perfect recovery of XOR-based visual cryptography scheme

被引:0
作者
Zhengxin Fu
Yuqiao Cheng
Bin Yu
机构
[1] Information Engineering University,
来源
Multimedia Tools and Applications | 2019年 / 78卷
关键词
Visual cryptography; XOR Operation; Ideal access structure; Perfect recovery; General access structure; Color image; Multiple secret images;
D O I
暂无
中图分类号
学科分类号
摘要
Visual cryptography is an interesting secret sharing scheme, in which participants can observe the secret image by stacking their shares. However, the size expansion and distorted visual effect are two disadvantages of visual cryptography. In this paper, we focus on how to realize the perfect recovery by XOR-ing shares directly. First, we propose the definition of ideal access structure, which is the key point of perfect recovery of XOR-based visual cryptography scheme. The characteristics of ideal access structure are analyzed, and the construction algorithm of shares under ideal access structure is designed. Based on the ideal access structure, a new algorithm is proposed for dividing the general access structure into several ideal access structures, and the secret sharing and recovering algorithms for general access structure are presented. Furthermore, our method can also be utilized in color visual cryptography and multi-secret visual cryptography. The security and perfect recovery of our method have been proved theoretically. Compared with the previous schemes, the proposed scheme realizes the perfect recovery of secret image by XOR-ing shares directly, and the sizes of shares can be decreased efficiently compared with the previous schemes.
引用
收藏
页码:2367 / 2384
页数:17
相关论文
共 32 条
[1]  
Ateniese G(1996)Visual cryptography for general access structures Inf Comput 129 86-106
[2]  
Blundo C(2009)Secret image sharing: a boolean-operations -based approach combining benefits of polynomial-based and fast approaches Int J Pattern Recognit Artif Intell 23 263-285
[3]  
Santis AD(2017)Fully incrementing visual cryptography from a succinct non-monotonic structure IEEE Transactions on Information Forensics & Security 12 1082-1091
[4]  
Stinson DR(2014)Optimal pixel expansion of deterministic visual cryptography scheme Multimedia Tools & Applications 73 1177-1193
[5]  
Chao K(2010)Step construction of visual cryptography schemes IEEE Transactions on Information Forensics & Security 5 27-38
[6]  
Lin J(2016)From action to activity: sensor-based activity recognition Neurocomputing 181 108-115
[7]  
Chen YC(1995)Visual cryptography LNCS 950 1-12
[8]  
Fu Z(2015)Minimizing pixel expansion in visual cryptographic scheme for general access structures IEEE Transactions on Circuits & Systems for Video Technology 25 1557-1561
[9]  
Yu B(2005)Xor-based visual cryptography schemes Designs Codes & Cryptography 37 169-186
[10]  
Liu F(2007)Two secret sharing schemes based on boolean operations Pattern Recogn 40 2776-2785