Skip to main content
Log in

XOR-based Visual Cryptography Schemes

  • Published:
Designs, Codes and Cryptography Aims and scope Submit manuscript

Abstract

A recent publication introduced a Visual Crypto (VC) system, based on the polarisation of light. This VC system has goodresolution, contrast and colour properties.Mathematically, the VC system is described by the XOR operation (modulo two addition). In this paper we investigate Threshold Visual Secret Sharing schemes associated to XOR-based VC systems. Firstly, we show that n out of n schemes with optimal resolution and contrast exist, and that (2,n) schemes are equivalent to binary codes. It turns out that these schemes have much better resolution than their OR-based counterparts. Secondly, we provide two explicit constructions for general k out of n schemes. Finally, we derive bounds on the contrast and resolution of XOR-based schemes. It follows from these bounds that for k<n, the contrast is strictly smaller than one. Moreover, the bounds imply that XOR-based k out of n schemes for even k are fundamentally different from those for odd k.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. B. Arazi I. Dinstein O. Kafri (1989) ArticleTitleIntuition, perception and secure communication IEEE Transactions on Systems, Man and Cybernetics. 19 1016–1120

    Google Scholar 

  2. Biham E., Itzkovitz A. Visual Cryptography with Polarization, http://www.cs.technion.ac.il/ biham/ Reports/visual.ps.gz. (1997)

  3. C. Blundo A. De Santis D.R. Stinson (1999) ArticleTitleOn the contrast in visual cryptography schemes Journal Cryptology. 12 261–289 Occurrence Handle10.1007/s001459900057

    Article  Google Scholar 

  4. Droste C. (1996). New Results on Visual Cryptography. Crypto 96, LNCS. 1109: 401–415 Springer-Verlag

  5. -S. Lee S J-C. Na S-W. Sohn C. Park D-H. Seo S-J. Kim (2002) ArticleTitleVisual cryptography based on an interferometric encryption technique ETRI Journal. 24 IssueID5 373–380

    Google Scholar 

  6. F.J. MacWilliams N.J.A. Sloane (1977) The Theory of Error-Correcting Codes Amsterdam-New York-Oxford North Holland

    Google Scholar 

  7. Naor M., Shamir A. (1994). Visual Cryptography, Eurocrypt 94, LNCS, Vol. 950, Springer-Verlag, pp. 1–12

  8. Naor M., Pinkas B. Visual Authentication and Identification, Crypto 97

  9. A. Santis Particlede (1998) On Visual Cryptography Schemes Proc. Information Theory Workshop Killarney, Ireland 154–155

    Google Scholar 

  10. D. R. Stinson, An Introduction to Visual Cryptography, presented at Public Key solutions ’97. Available at http://bibd.unl.edu/ stinson/VCS-PKS.ps. (1997).

  11. P. Tuyls, T. Kevenaar, G. J. Schrijen, A. A. M. Staring and M. van Dijk, Visual crypto displays enabling secure communications, In Security in Pervasive Computing, LNCS2802, pp. 271–284. (2003).

  12. E. Verheul H.C.A. Tilborg Particlevan (1997) ArticleTitleConstructions and properties of k out of n Visual Secret Sharing Schemes Designs Codes and Cryptography. 11 179–196 Occurrence Handle10.1023/A:1008280705142

    Article  Google Scholar 

  13. J. Riordan (1979) Combinatorial Identities R. E. Krieger Publishing Company Huntington, New York

    Google Scholar 

  14. R.L. Graham, D. E. Knuth and O. Patashnik, Concrete Mathematics: A Foundation for Computer Science, Addison-Wesley (1992).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. Tuyls.

Additional information

Communicated by: P. Wild

AMS Classification: 94A60

Rights and permissions

Reprints and permissions

About this article

Cite this article

Tuyls, P., Hollmann, H.D.L., Lint, J.H.V. et al. XOR-based Visual Cryptography Schemes. Des Codes Crypt 37, 169–186 (2005). https://doi.org/10.1007/s10623-004-3816-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10623-004-3816-4

Keywords

Navigation