Extended capabilities for visual cryptography

نویسندگان

  • Giuseppe Ateniese
  • Carlo Blundo
  • Alfredo De Santis
  • Douglas R. Stinson
چکیده

An extended visual cryptography scheme, EVCS for short, for an access structure (? Qual ; ? Forb) on a set of n participants, is a technique to encode n images in such a way that when we stack together the transparencies associated to participants in any set X 2 ? Qual we get the secret message with no trace of the original images, but any X 2 ? Forb has no information on the shared image. Moreover, after the original images are encoded they are still meaningful, that is, any user will recognize the image on his transparency. The main contributions of this paper are the following: A trade-oo between the contrast of the reconstructed image and the contrast of the image on each transparency for (k; k)-threshold EVCS (in a (k; k)-threshold EVCS the image is visible if and only if k transparencies are stacked together). This yields a necessary and suucient condition for the existence of (k; k)-threshold EVCS for the values of such contrasts. In case a scheme exists we explicitly construct it. A general technique to implement extended visual cryptography schemes, which uses hypergraph colourings. This technique yields (k; k)-threshold EVCS which are optimal with respect to the pixel expansion. Finally, we discuss some applications of this technique to various interesting classes of access structures by using relevant results from the theory of hypergraph colourings.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

مطالعه‌ای بر رمز‌نگاری بصری و ارائه‌ی روش پیشنهادی برای رمزنگاری تصاویر رنگی

Visual cryptography is a method that makes use of the characteristics of human vision and it requires neither the knowledge of cryptography nor the complex calculations. This method was first proposed by Naor and Shamir, its implementation is simple, it has been extended to an secrect sharing (k, n) in which n shares are made from the image and they are distributed among n participants. Moreov...

متن کامل

Comparative Analysis on Visual Cryptographic Schemes

Visual cryptography is the techniques that deal with providing security to the multimedia data. The main concept behind this is, to encrypt a secret image into some shares. The secret can be revealed only when all the shares are combined. The central theme of visual cryptography is that it doesn’t require any manipulation or tough cryptographic knowledge and the decryption is done by human visi...

متن کامل

On the Pixel Expansion of Hypergraph Access Structures in Visual Cryptography Schemes

In a visual cryptography scheme, a secret image is encoded into n shares, in the form of transparencies. The shares are then distributed to n participants. Qualified subsets of participants can recover the secret image by superimposing their transparencies, but non-qualified subsets of participants have no information about the secret image. Pixel expansion, which represents the number of subpi...

متن کامل

Contrast Enhancement in Color Extended Visual Cryptography

Visual cryptography is a secret sharing technique mainly used for image sharing. In the case of extended visual cryptography we use meaningful shares to hide image. Contrast loss in decrypted image is a major problem. Here we use Additional basis matrix and perfect white pixel reconstruction to improve the contrast in color extended visual cryptography. Keywords— Visual Cryptography (VC), Halft...

متن کامل

Maximal Independent Sets for the Pixel Expansion of Graph Access Structure

 Abstract : A visual cryptography scheme based on a given graph G is a method to distribute a secret image among the vertices of G, the participants, so that a subset of participants can recover the secret image if they contain an edge of G, by stacking their shares, otherwise they can obtain no information regarding the secret image. In this paper a maximal independent sets of the graph G was ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Theor. Comput. Sci.

دوره 250  شماره 

صفحات  -

تاریخ انتشار 2001