Ideal Contrast Visual Cryptography for General Access Structures with AND Operation

Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 44)


In Visual Cryptographic Scheme (VCS) reversing operations (NOT operations) are carried out during reconstruction process to improve the quality of the reconstructed secret image. Many studies were reported on using reversing operation in both perfect and nonperfect black VCS. In 2005, Cimato et al. put forward an ideal contrast VCS with reversing, which is applicable to any access structures (IC-GA-VCS). Here there will not be any change in resolution for reconstructed secret image in comparison with original secret image (KI). In this paper a proposal for replacing reversing operations with AND operations during reconstruction in perfect black VCS is shown. A comparison of the proposed modification with Cimato et al. construction and other related work are discussed in this paper.


Visual cryptography Secret sharing Perfect reconstruction Ideal contrast 


  1. 1.
    Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)Google Scholar
  2. 2.
    Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual cryptography for general access structures. Inf. Comput. 129(2), 86–106 (1996)CrossRefMATHGoogle Scholar
  3. 3.
    Droste, S.: New results on visual cryptography. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 401–415. Springer, Heidelberg (1996)Google Scholar
  4. 4.
    Adhikari, A., Dutta, T.K., Roy, B.: A new black and white visual cryptographic scheme for general access structures. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol. 3348, pp. 399–413. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  5. 5.
    Tylus, P., Hollman, H.D.L., Lint, J.H.V., Tolhuizen, L.: XOR based visual cryptographic schemes. Design Codes Crypto. 37(1), 169–186 (2005)CrossRefGoogle Scholar
  6. 6.
    Viet, D.Q., Kurosawa, K.: Almost ideal contrast visual cryptography with reversing. In: Okamoto, T. (eds.) CT-RSA 2004. LNCS, vol. 2964, pp. 353–365 (2004)Google Scholar
  7. 7.
    Hu, C.M., Tzeng, W.G.: Compatible ideal contrast visual cryptography schemes with reversing. In: Zhou, J. (ed.) ISC 2005. LNCS, vol. 3650, pp. 300–313. Springer, Heidelberg (2005)Google Scholar
  8. 8.
    Yang, C.N., Wang, C.C, Chen, T.S.: Real perfect contrast visual secret sharing schemes with reversing. In: Zhou, J., Yung, M., Bao, F. (ed.): ACNS 2006. LNCS, vol. 3989, pp. 433–447. Springer, Heidelberg (2006)Google Scholar
  9. 9.
    Yang, C.N., Wang, C.C., Chen, T.S.: Visual cryptography schemes with reversing. Comput. J. 51(6), 710–722 (2008)CrossRefGoogle Scholar
  10. 10.
    Cimato, S., De Santis, A., Ferrara, A.L., Masucci, B.: Ideal contrast visual cryptography schemes with reversing. Inf. Process. Lett. 93(4), 199–206 (2005)CrossRefMATHGoogle Scholar
  11. 11.
    Zhang, H., Wang, X., Huang, Y.: A novel ideal contrast visual secret sharing scheme with reversing. J. Multimedia 4(3), 104–111 (2009)Google Scholar

Copyright information

© Springer India 2016

Authors and Affiliations

  1. 1.Amrita Vishwa VidyapeethamCoimbatoreIndia

Personalised recommendations