On the Pixel Expansion of Hypergraph Access Structures in Visual Cryptography Schemes

نویسنده

  • Abbas Cheraghi
چکیده مقاله:

In a visual cryptography scheme, a secret image is encoded into n shares, in the form of transparencies. The shares are then distributed to n participants. Qualified subsets of participants can recover the secret image by superimposing their transparencies, but non-qualified subsets of participants have no information about the secret image. Pixel expansion, which represents the number of subpixels in the encoding of the secret image, should be as small as possible. Optimal schemes are those that have the minimum pixel expansion. In this paper we study the pixel expansion of hypergraph access structures and introduce a number of upper bounds on the pixel expansion of special kinds of access structures. Also we demonstrate the minimum pixel expansion of induced matching hypergraph is sharp when every qualified subset is exactly one edge with odd size. Furthermore we explain that the minimum pixel expansion of every graph access structure $P_{n}$ is exactly $lceil frac{ n+1}{2}rceil$. It indicates the lower bound mentioned in [4] is sharp.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Visual cryptography schemes with optimal pixel expansion

A visual cryptography scheme encodes a black & white secret image into n shadow images called shares which are distributed to the n participants. Such shares are such that only qualified subsets of participants can “visually” recover the secret image. Usually, the reconstructed image will be darker than the background of the image itself. In this paper we consider visual cryptography schemes sa...

متن کامل

Achieving Optimal Contrast in Visual Cryptography Schemes without Pixel Expansion

In this paper we present visual cryptography scheme to encode a black and white image into the same size shares as the secret image. In addition, an improved method for the generation of shares is proposed using additional matrix. Visual cryptography method for encrypting printed texts, handwritten notes, and pictures are done in a perfectly secure way, and decoding these data with the human vi...

متن کامل

Survey of Visual Cryptography Schemes without Pixel Expansion

The basic idea of the Visual Cryptography is to encrypt a secret image into n number of meaningless share images. The Visual Cryptography technique cannot leak the encrypted information of the shared secret by virtue of any combination of the n share images combined together. This share images are printed on separate transparencies and distributed as shares such that, when the share images are ...

متن کامل

Maximal Independent Sets for the Pixel Expansion of Graph Access Structure

 Abstract : A visual cryptography scheme based on a given graph G is a method to distribute a secret image among the vertices of G, the participants, so that a subset of participants can recover the secret image if they contain an edge of G, by stacking their shares, otherwise they can obtain no information regarding the secret image. In this paper a maximal independent sets of the graph G was ...

متن کامل

MAXIMAL INDEPENDENT SETS FOR THE PIXEL EXPANSION OF GRAPH ACCESS STRUCTURE

Given a graph G, a visual cryptography scheme based on the graph G is a method to distribute a secret image among the vertices of G, the participants, so that a subset of participants can recover the secret image if they contain an edge of G, by stacking their shares, otherwise they can obtain no information regarding the secret image. In this paper we apply maximal independent sets of the grap...

متن کامل

Halftone Visual Cryptography with Pixel Expansion through Error Diffusion

Extended Visual Cryptography (EVC) concept provides meaningful shares instead of non meaningful shares. In this paper we proposed an algorithm based on EVC which enhances the contrast of the recovered secret image. Here the size of image visible on shares is taken to be three times as that of secret image, both the images are assumed in grey level. In the proposed algorithm secret image and the...

متن کامل

منابع من

با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ذخیره در منابع من قبلا به منابع من ذحیره شده

{@ msg_add @}


عنوان ژورنال

دوره 5  شماره None

صفحات  45- 54

تاریخ انتشار 2010-11

با دنبال کردن یک ژورنال هنگامی که شماره جدید این ژورنال منتشر می شود به شما از طریق ایمیل اطلاع داده می شود.

کلمات کلیدی

میزبانی شده توسط پلتفرم ابری doprax.com

copyright © 2015-2023