Skip to main content
Log in

Construction vectors for visual cryptographic schemes

  • Cryptology
  • Published:
Wuhan University Journal of Natural Sciences

Abstract

The concept of group construction vector and independent construction vector for visual cryptography is proposed, and the method based on construction vector is presented for constructing basis matrices. The general solutions to construction vectors and the general solutions to k out of n visual cryptographic schemes are obtained. Using the construction vectors, everyone can construct visual cryptographic schemes simply and efficaciously according to the formulas. The concept and the general solutions to construction vector present a good idea for researches on visual cryptographic schemes, including structural properties, the bound of pixel expansion and contrast, and optimal construction.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Naor M, Shamir A. Visual cryptography[C]//Advances in Cryptology -Eurocrypt’94(LNCS950). Berlin: Springer-Verlag, 1995: 1–12.

    Google Scholar 

  2. Ateniese G, Blundo C, Santis A D, et al. Visual cryptography for general access structures[J]. Information and Computation, 1996, 129(2): 86–106.

    Article  Google Scholar 

  3. Ateniese G, Blundo C, Santis A D, et al. Extended capabilities for visual cryptography[J]. Theoretical Computer Science, 2001, 250(1–2): 143–161.

    Article  Google Scholar 

  4. Kuwakado H, Tanaka H. Polynomial representation of visual secret sharing scheme and its application[J]. IEICE Transaction on Fundamentals, 2002, E85-A(6): 1379–1386.

    Google Scholar 

  5. Blundo C, D’Arco P, Santis A D, et al. Contrast optimal threshold visual cryptography schemes[J]. SIAM Journal on Discrete Mathematics, 1998, 16(2): 224–261.

    Article  Google Scholar 

  6. Eisen P A, Stinson D R. Threshold visual cryptography schemes with specified whiteness levels of reconstructed pixels[J]. Designs, Codes and Cryptography, 2002, 25: 15–61.

    Article  Google Scholar 

  7. Verheul E R, van Tilborg H C A. Constructions and properties of k out of n visual secret sharing schemes[J]. Designs, Codes and Cryptography, 1997, 11(2): 179–196.

    Article  Google Scholar 

  8. Blundo C, Santis A D. Visual cryptography schemes with perfect reconstruction of black pixels[J]. Journal for Computers & Graphics, 1998, 12(4): 449–455.

    Article  Google Scholar 

  9. Blundo C, Santis A D, Stinson D R. On the contrast in visual cryptography schemes[J]. Journal of Cryptology, 1999, 12: 261–289.

    Article  Google Scholar 

  10. Blundo C, Santis A D, Naor M. Visual cryptography for gray level images[J]. Information Processing Letters, 2000, 75(6): 255–259.

    Article  Google Scholar 

  11. Yang C N, Laih C S. New colored visual secret sharing scheme[J]. Designs, Codes and Cryptography, 2000, 20(3): 325–335.

    Article  Google Scholar 

  12. Blundo C, Bonis A D, Santis A D. Improved schemes for visual cryptography[J]. Designs, Codes and Cryptography, 2001, 24: 255–278.

    Article  Google Scholar 

  13. Hou Y C, Lin C F, Chang C Y. Visual cryptography for color images without pixel expansion[J]. Journal of Technology, 2001, 16(4): 595–603.

    Google Scholar 

  14. Iwamoto M, Yamamoto H. The optimal n-out-of-n visual secret sharing scheme for gray-scale images[J]. IEICE Transaction on Fundamentals, 2002, E85-A(10): 2238–2247.

    Google Scholar 

  15. Tzeng W G, Hu C M. A new approach for visual cryptography[ J]. Designs, Codes and Cryptography, 2002, 27(3): 207–227.

    Article  Google Scholar 

  16. Hou Y C. Visual cryptography for color images[J]. Pattern Recognition, 2003, 36: 1619–1629.

    Article  Google Scholar 

  17. Shyu S J, Chen K. Visual multiple secret sharing based upon turning and flipping[J]. Information Sciences, 2011, 181(15): 3246–3266.

    Article  Google Scholar 

  18. Lee K H, Chiu P L. A high contrast and capacity efficient visual cryptography scheme for the encryption of multiple secret images[J]. Optics Communications, 2011, 284(12): 2730–2741.

    Article  CAS  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ruchun Fei.

Additional information

Biography: FEI Ruchun, male, Ph.D., Professor, research direction: network communications and information security.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Fei, R. Construction vectors for visual cryptographic schemes. Wuhan Univ. J. Nat. Sci. 19, 441–448 (2014). https://doi.org/10.1007/s11859-014-1037-x

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11859-014-1037-x

Key words

CLC number

Navigation