Advertisement

A Probabilistic Essential Visual Cryptographic Scheme for Plural Secret Images

Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 28)

Abstract

In order to reduce the pixel expansion of visual cryptography scheme (VCS), many probabilistic schemes were proposed. Let P = {P 1,P 2,P 3,...,P n } be the set of participants. The minimal qualified set for essential VCS is given by Γ0={A: A ⊆ P, P 1 ∈ A and |A| = k}. In this paper we propose a construction of probabilistic essential VCS for sharing plural secret images simultaneously.

Keywords

Essential Visual Cryptography multiple secrets Probabilistic schemes 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Arumugam, S., Lakshmanan, R., Nagar, A.K.: On (k, n)*-Visual Cryptography Scheme. Designs, Codes and Cryptography (2012)Google Scholar
  2. 2.
    Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual Cryptography for General Access Structures. Information and Computation 129(2), 86–106 (1996)MathSciNetCrossRefMATHGoogle Scholar
  3. 3.
    Droste, S.: New Results on Visual Cryptography. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 401–415. Springer, Heidelberg (1996)Google Scholar
  4. 4.
    Iwamoto, M., Yamamoto, H.: A construction method of visual secret sharing schemes for plural secret images. IEICE Transactions on Fundamentals of Electronic Communications and Computer Sciences 86(10) (2003)Google Scholar
  5. 5.
    Praveen, K., Rajeev, K., Sethumadhavan, M.: On the Extensions of (k, n)*-Visual Cryptographic Schemes. In: Martínez Pérez, G., Thampi, S.M., Ko, R., Shu, L. (eds.) SNDS 2014. Communications in Computer and Information Science, vol. 420, pp. 231–238. Springer, Heidelberg (2014)CrossRefGoogle Scholar
  6. 6.
    Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)CrossRefGoogle Scholar
  7. 7.
    Tuyls, P., Hollmann, H.D.L., Lint, J.H.V., Tolhuizen, L.: XOR-based visual cryptography schemes. Designs, Codes and Cryptography 37(1), 169–186 (2005)MathSciNetCrossRefMATHGoogle Scholar
  8. 8.
    Yang, C.N.: New Visual Secret Sharing Schemes Using Probabilistic Method. Pattern Recognition Letters 25(4), 481–494 (2004)CrossRefGoogle Scholar
  9. 9.
    Yu, B., Shen, G.: Multi-secret visual cryptography with deterministic contrast. Multimedia Tools and Applications (2013)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.TIFAC CORE in Cyber SecurityAmrita Vishwa VidyapeethamCoimbatoreIndia

Personalised recommendations