Skip to main content

On \((k, n)\) Visual Cryptography Scheme with \(t\) Essential Parties

  • Conference paper
  • First Online:
Information Theoretic Security (ICITS 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8317))

Included in the following conference series:

Abstract

In visual cryptography schemes (VCS), we often denote the set of all parties by \(P=\{1,2,\cdots ,n\}\). Arumugam et al. proposed a \((k,n)\)-VCS with one essential party recently, in which only subset \(S\) of parties satisfying \(S\subseteq P\) and \(|S|\ge k\) and \(1\in S\) can recover the secret. In this paper, we extend Arumugam et al.’s idea and propose a \((k,n)\)-VCS with \(t\) essential parties, say \((k,n,t)\)-VCS for brevity, in which only subset \(S\) of parties satisfying \(S\subseteq P\) and \(|S|\ge k\) and \(\{1,2,\ldots ,t\}\in S\) can recover the secret. Furthermore, some bounds for the optimal pixel expansion and optimal relative contrast of \((k,n,t)\)-VCS are derived.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)

    Google Scholar 

  2. Droste, S.: New results on visual cryptography. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 401–415. Springer, Heidelberg (1996)

    Google Scholar 

  3. Verheul, E., Tilborg, H.V.: Constructions and properties of k out of n visual secret sharing schemes. Des. Codes Crypt. 11(2), 179–196 (1997)

    Article  MATH  Google Scholar 

  4. Eisen, P.A., Stinson, D.R.: Threshold visual cryptography schemes with specified whiteness levels of reconstructed pixels. Des. Codes Crypt. 25, 15–61 (2002)

    Article  MATH  MathSciNet  Google Scholar 

  5. Hofmeister, T., Krause, M., Simon, H.U.: Contrast-optimal k out of n secret sharing schemes in visual cryptography. Theoret. Comput. Sci. 240(2), 471–485 (2000)

    Article  MATH  MathSciNet  Google Scholar 

  6. Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual cryptography for general access structures. Inf. Comput. 129, 86–106 (1996)

    Article  MATH  Google Scholar 

  7. Tzeng, W.G., Hu, C.M.: A new approach for visual cryptography. Des. Codes Crypt. 27, 207–227 (2002)

    Article  MATH  MathSciNet  Google Scholar 

  8. Blundo, C., Cimato, S., De Santis, A.: Visual cryptography schemes with optimal pixel expansion. Theoret. Comput. Sci. 369, 169–182 (2006)

    Article  MATH  MathSciNet  Google Scholar 

  9. Liu, F., Wu, C.K., Lin, X.J.: The alignment problem of visual cryptography schemes. Des. Codes Crypt. 50, 215–227 (2009)

    Article  MathSciNet  Google Scholar 

  10. Wang, D.S., Dong, L., Li, X.B.: Towards shift tolerant visual secret sharing schemes. IEEE Trans. Inf. Forensics Secur. 6(2), 323–337 (2011)

    Article  Google Scholar 

  11. Horng, G.B., Chen, T.H., Tsai, D.S.: Cheating in visual cryptography. Des. Codes Crypt. 38, 219–236 (2006)

    Article  MATH  MathSciNet  Google Scholar 

  12. Hu, C.M., Tzeng, W.G.: Cheating prevention in visual cryptography. IEEE Trans. Image Process. 16(1), 36–45 (2007)

    Article  MathSciNet  Google Scholar 

  13. Chen, Y.C., Horng, G., Tsai, D.S.: Comment on “cheating prevention in visual cryptography”. IEEE Trans. Image Process. 21(7), 3319–3323 (2012)

    Article  MathSciNet  Google Scholar 

  14. Wang, R.Z.: Region incrementing visual cryptography. IEEE Signal Process. Lett. 16(8), 659–662 (2009)

    Article  Google Scholar 

  15. Yang, C.N., Shih, H.W., Wu, C.C., Harn, L.: k out of n region incrementing scheme in visual cryptography. IEEE Trans. Circuits Syst. Video Technol. 22(6), 779–810 (2012)

    Google Scholar 

  16. Shyu, S.J.: Efficient construction for region incrementing visual cryptography. IEEE Trans. Circuits Syst. Video Technol. 22(5), 769–777 (2012)

    Article  MathSciNet  Google Scholar 

  17. Guo, T., Liu, F., Wu, C.K.: Threshold visual secret sharing by random grids with improved contrast. J. Syst. Softw. 86, 2094–2109 (2013)

    Article  Google Scholar 

  18. Guo, T., Liu, F., Wu, C.K.: k out of k extended visual cryptography scheme by random grids. Sig. Process 94, 90–101 (2014)

    Article  Google Scholar 

  19. Arumugam, S., Lakshmanan, R., Nagar, A.K.: On (k, n)*-visual cryptography scheme. Des. Codes Crypt. (2012). doi:10.1007/s10623-012-9722-2

    Google Scholar 

  20. Blundo, C., De Santis, A., Stinson, D.R.: On the contrast in visual cryptography schemes. J. Crypt. 12(4), 261–289 (1999)

    Article  MATH  Google Scholar 

  21. Adhikari, A., Dutta, T.K., Roy, B.: A new black and white visual cryptographic scheme for general access structures. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol. 3348, pp. 399–413. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

Download references

Acknowledgments

This work was supported by 863 Program grant No. Y370071102, the “Strategic Priority Research Program” of the Chinese Academy of Sciences grant No. XDA06010701, the IIE’s Projects grant No. Y3Z001B102 and NSFC grant No. 61303256.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Teng Guo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Guo, T., Liu, F., Wu, C., Ren, Y., Wang, W. (2014). On \((k, n)\) Visual Cryptography Scheme with \(t\) Essential Parties. In: Padró, C. (eds) Information Theoretic Security. ICITS 2013. Lecture Notes in Computer Science(), vol 8317. Springer, Cham. https://doi.org/10.1007/978-3-319-04268-8_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-04268-8_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-04267-1

  • Online ISBN: 978-3-319-04268-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics