Real Perfect Contrast Visual Secret Sharing Schemes with Reversing

  • Ching-Nung Yang
  • Chung-Chun Wang
  • Tse-Shih Chen
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3989)

Abstract

The visual secret sharing (VSS for short) scheme is a secret image sharing scheme. A secret image is visually revealed from overlapping shadow images without additional computations. However, the contrast of reconstructed image is much lost. By means of the reversing operation (reverse black and white), Viet and Kurosawa used the traditional VSS scheme to design a VSS scheme which the secret image is almost perfectly reconstructed. Two drawbacks of the Viet-Kurosawa scheme are: (1) one can only reconstruct an almost ideal-contrast image but not an ideal-contrast image (2) the used traditional VSS scheme must be a perfect black scheme. This paper shows a real perfect contrast VSS scheme such that black and white pixels are all perfectly reconstructed within finite runs, no matter what type (perfect black or non-perfect black) of the traditional VSS scheme is.

Keywords

Visual secret sharing scheme secret sharing scheme ideal contrast 

References

  1. 1.
    Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)CrossRefGoogle Scholar
  2. 2.
    Eisen, P.A., Stinson, D.R.: Threshold visual cryptography schemes with specified whiteness levels of reconstructed pixels. Designs, Codes and Cryptography 25(1), 15–61 (2002)MathSciNetCrossRefMATHGoogle Scholar
  3. 3.
    Viet, D.Q., Kurosawa, K.: Almost Ideal Contrast Visual Cryptography with Reversing. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 353–365. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  4. 4.
    Cimato, S., De Santis, A., Ferrara, A.L., Masucci, B.: Ideal contrast visual cryptography schemes with reversing. Information Processing Letters 93(4), 199–206 (2005)MathSciNetCrossRefMATHGoogle Scholar
  5. 5.
    Yang, C.N.: New Visual Secret Sharing Schemes Using Probabilistic Method. Pattern Recognition Letters 25(4), 481–494 (2004)CrossRefGoogle Scholar
  6. 6.
    Ito, R., Kuwakado, H., Tanaka, H.: Image size invariant visual cryptography. IEICE Trans. Fundamentals E82-A(10), 2172–2177 (1999)Google Scholar
  7. 7.
    De Bonis, A., De Santis, A.: Randomness in secret sharing and visual cryptography schemes. Theoretical Computer Science 314(3), 351–374 (2004)MathSciNetCrossRefMATHGoogle Scholar
  8. 8.
    Tuyls, P., Hollmann, H.D.L., Van Lint, J.H., Tolhuizen, L.: XOR-based Visual Cryptography Schemes. Designs, Codes and Cryptography 37, 169–186 (2005)MathSciNetCrossRefMATHGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Ching-Nung Yang
    • 1
  • Chung-Chun Wang
    • 1
  • Tse-Shih Chen
    • 1
  1. 1.Department of Computer Science and Information EngineeringNational Dong Hwa UniversityHualienTaiwan

Personalised recommendations