Designs, Codes and Cryptography

, Volume 20, Issue 3, pp 325–336

New Colored Visual Secret Sharing Schemes

  • Ching-Nung Yang
  • Chi-Sung Laih
Article

Abstract

Visual secretsharing (VSS) schemes are used to protect the visual secret bysending n transparencies to different participantsso that k-1 or fewer of them have no informationabout the original image, but the image can be seen by stackingk or more transparencies. However, the revealedsecret image of a conventional VSS scheme is just black and white.The colored k out of n VSS scheme sharinga colored image is first introduced by Verheul and Van Tilborg[1]. In this paper, a new construction for the colored VSS schemeis proposed. This scheme can be easily implemented on basis ofa black & white VSS scheme and get much better block lengththan the Verheul-Van Tilborg scheme.

Visual cryptography secret sharing scheme 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson, Constructions and bounds for visual cryptography, Proc. 23rd International Colloquium on Automata, Languages, and Programming (ICALP' 96), (1996) pp. 416–428.Google Scholar
  2. 2.
    G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson, Visual cryptography for general access structures, ECCC, Electronic Colloquium on Computational Complexity (TR96–012), via WWW using http://www.eccc.uni-trier.de/eccc/.Google Scholar
  3. 3.
    G. R. Blakley, Safeguarding cryptographic keys, AFIPS Conference Proceedings, Vol. 48 (1979) pp. 313–317.Google Scholar
  4. 4.
    S. Droste, New results on visual cryptography, Advances in Cryptology-CRYPTO' 96, Lecture Notes in Computer Science, No. 1109 (1996) pp. 401–415.Google Scholar
  5. 5.
    T. Katoh and H. Imai, Some visual secret sharing schemes and their share size, Proceedings of International Conferences on Cryptology and Information Security, (1996) pp. 41–47.Google Scholar
  6. 6.
    Kazukuni, Kobara and H. Imai, Limiting the visible space visual secret sharing schemes and their application to human identification, Advances in Cryptology-ASISCRYPTO' 96, Lecture Notes in Computer Science, No. 1163 (1996) pp. 185–195.Google Scholar
  7. 7.
    M. Naor and A. Shamir, Visual cryptography, Advances in Cryptology-EUROCRYPT' 94, Lecture Notes in Computer Science, No. 950 (1995) pp. 1–12.Google Scholar
  8. 8.
    A. Shamir, How to share a secret, Commun. of the ACM, Vol. 22 (1979) pp. 612–613.Google Scholar
  9. 9.
    E. R. Verheul and H. C. A. Van Tilborg, Constructions and properties of k out of n visual secret sharing schemes, Designs, Codes and Cryptography, Vol. 11, No. 2 (1997) pp. 179–196Google Scholar

Copyright information

© Kluwer Academic Publishers 2000

Authors and Affiliations

  • Ching-Nung Yang
    • 1
  • Chi-Sung Laih
    • 2
  1. 1.Department of Computer Science and Information EngineeringNational Dong Hwa UniversityHualienTaiwan
  2. 2.Department of Electrical EngineeringNational Cheng Kung UniversityTainanTaiwan, R.O.C.

Personalised recommendations