Abstract
The concept of group construction vector and independent construction vector for visual cryptography is proposed, and the method based on construction vector is presented for constructing basis matrices. The general solutions to construction vectors and the general solutions to k out of n visual cryptographic schemes are obtained. Using the construction vectors, everyone can construct visual cryptographic schemes simply and efficaciously according to the formulas. The concept and the general solutions to construction vector present a good idea for researches on visual cryptographic schemes, including structural properties, the bound of pixel expansion and contrast, and optimal construction.
Similar content being viewed by others
References
Naor M, Shamir A. Visual cryptography[C]//Advances in Cryptology -Eurocrypt’94(LNCS950). Berlin: Springer-Verlag, 1995: 1–12.
Ateniese G, Blundo C, Santis A D, et al. Visual cryptography for general access structures[J]. Information and Computation, 1996, 129(2): 86–106.
Ateniese G, Blundo C, Santis A D, et al. Extended capabilities for visual cryptography[J]. Theoretical Computer Science, 2001, 250(1–2): 143–161.
Kuwakado H, Tanaka H. Polynomial representation of visual secret sharing scheme and its application[J]. IEICE Transaction on Fundamentals, 2002, E85-A(6): 1379–1386.
Blundo C, D’Arco P, Santis A D, et al. Contrast optimal threshold visual cryptography schemes[J]. SIAM Journal on Discrete Mathematics, 1998, 16(2): 224–261.
Eisen P A, Stinson D R. Threshold visual cryptography schemes with specified whiteness levels of reconstructed pixels[J]. Designs, Codes and Cryptography, 2002, 25: 15–61.
Verheul E R, van Tilborg H C A. Constructions and properties of k out of n visual secret sharing schemes[J]. Designs, Codes and Cryptography, 1997, 11(2): 179–196.
Blundo C, Santis A D. Visual cryptography schemes with perfect reconstruction of black pixels[J]. Journal for Computers & Graphics, 1998, 12(4): 449–455.
Blundo C, Santis A D, Stinson D R. On the contrast in visual cryptography schemes[J]. Journal of Cryptology, 1999, 12: 261–289.
Blundo C, Santis A D, Naor M. Visual cryptography for gray level images[J]. Information Processing Letters, 2000, 75(6): 255–259.
Yang C N, Laih C S. New colored visual secret sharing scheme[J]. Designs, Codes and Cryptography, 2000, 20(3): 325–335.
Blundo C, Bonis A D, Santis A D. Improved schemes for visual cryptography[J]. Designs, Codes and Cryptography, 2001, 24: 255–278.
Hou Y C, Lin C F, Chang C Y. Visual cryptography for color images without pixel expansion[J]. Journal of Technology, 2001, 16(4): 595–603.
Iwamoto M, Yamamoto H. The optimal n-out-of-n visual secret sharing scheme for gray-scale images[J]. IEICE Transaction on Fundamentals, 2002, E85-A(10): 2238–2247.
Tzeng W G, Hu C M. A new approach for visual cryptography[ J]. Designs, Codes and Cryptography, 2002, 27(3): 207–227.
Hou Y C. Visual cryptography for color images[J]. Pattern Recognition, 2003, 36: 1619–1629.
Shyu S J, Chen K. Visual multiple secret sharing based upon turning and flipping[J]. Information Sciences, 2011, 181(15): 3246–3266.
Lee K H, Chiu P L. A high contrast and capacity efficient visual cryptography scheme for the encryption of multiple secret images[J]. Optics Communications, 2011, 284(12): 2730–2741.
Author information
Authors and Affiliations
Corresponding author
Additional information
Biography: FEI Ruchun, male, Ph.D., Professor, research direction: network communications and information security.
Rights and permissions
About this article
Cite this article
Fei, R. Construction vectors for visual cryptographic schemes. Wuhan Univ. J. Nat. Sci. 19, 441–448 (2014). https://doi.org/10.1007/s11859-014-1037-x
Received:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11859-014-1037-x