Abstract
Though the monochrome (black and white) visual cryptography has a very rich literature, a very few papers have been published for the construction of general access structure. In this paper we put forward a method of construction of a strong monochrome visual cryptographic scheme (VCS) for general access structure using linear algebra. As a particular case of general access structure, \((k,n)\)-VCS for \(2 \le k \le n\) is obtained. The \((n,n)\)-VCS obtained from the scheme attains the optimal pixel expansion as well as optimal relative contrast. We provide an efficient construction of \((n-1,n)\)-VCS. We further extend our monochrome VCS to color VCS for restricted access structures. Finally, we provide some interesting examples that will lead to some future research directions in the area of VCS.
Similar content being viewed by others
References
Adhikari A., Bose M.: A new visual cryptographic scheme using Latin squares. IEICE Trans. Fundam. E87-A(5), 1998–2002 (2004).
Adhikari A., Sikdar S.: A new \((2, n)\)-color visual threshold scheme for color images. In: Indocrypt’03. Lecture Notes in Computer Science, vol. 2904, pp. 148–161. Springer, Berlin (2003).
Adhikari A., Dutta T.K., Roy B.: A new black and white visual cryptographic scheme for general access structures. In: Indocrypt’04. Lecture Notes in Computer Science, vol. 3348, pp. 399–413. Springer, Berlin (2004).
Adhikari A., Kumar D., Bose M., Roy B.: Applications of partially balanced and balanced incomplete block designs in developing visual cryptographic schemes. IEICE Trans. Fundam. E-90A(5), 949–951 (2007).
Ateniese G., Blundo C., De Santis A., Stinson D.R.: Visual cryptography for general access structures. Inf. Comput. 129, 86–106 (1996).
Ateniese G., Blundo C., De Santis A., Stinson D.R.: Constructions and bounds for visual cryptography. In: auf der Heide F.M., Monien B. (eds.) 23rd International Colloquim on Automata, Languages and Programming (ICALP ’96). Lecture Notes in Computer Science, vol. 1099, pp. 416–428. Springer, Berlin (1996).
Bitner J.R., Ehrlich G., Reingold E.M.: Efficient generation of the binary reflected Gray code. Commun. ACM 19(9), 517–521 (1976).
Blundo C., De Santis A., Stinson D.R.: On the contrast in visual cryptography schemes. J. Cryptol. 12(4), 261–289 (1999).
Blundo C., Bonis A.D., Santis A.D.: Improved schemes for visual cryptography. Des. Codes Cryptogr. 24, 255–278 (2001).
Blundo C., D’arco P., De Santis A., Stinson D.R.: Contrast optimal threshold visual cryptography. SIAM J. Discret. Math. 16(2), 224–261 (2003).
Chang C-C., Lin C.-C., Tu H.N.: Safeguarding visual information using (t, n) verifiable secret shares. J. Comput. 22(2) (2011).
Cimato S., Prisco R.D., Santis A.D.: Optimal colored threshold visual cryptography schemes. Des. Codes Cryptogr. 35, 311–335 (2005).
Cimato S., De Prisco R., De Santis A.: Colored visual cryptography without color darkening. Theor. Comput. Sci. 374(1–3), 261–276 (2007).
Droste S.: New results on visual cryptography. In: Advance in Cryptography-CRYPTO’96. Lecture Notes in Computer Science, vol. 1109, pp. 401–415, Springer, Berlin (1996).
Ishihara T., Koga H., New constructions of the lattice-based visual secret sharing using mixture of colors. IEICE Trans. Fundam. E85-A(1), 158–166 (2002).
Iwamoto M.: A weak security notion for visual secret sharing schemes. IEEE Trans. Inf. Forensics Secur. 7(2), 372–382 (2012).
Koga H., Ishihara T.: A general method for construction of (t, n)-threshold visual secret sharing schemes for color images. Des. Codes Cryptogr. 61(2), 223–249 (2011).
Koga H., Yamamoto H.: Proposal of a lattice-based visual secret sharing scheme for color and gray-scale images. IEICE Trans. Fundam. E81-A(6), 1262–1269 (1998).
Koga H., Iwamoto M., Yamamoto H.: An analytic construction of the visual secret scheme for color images. IEICE Trans. Fundam. E84-A(1), 262–272 (2001).
Leung B.W., Ng F.Y., Wong D.S.: On the security of a visual cryptography scheme for color images. Pattern Recognit. 42(5), 929–940 (2009).
Naor M., Shamir A.: Visual cryptography. In: Advance in Cryptography, Eurocrypt’94. Lecture Notes in Computer Science, vol. 950, pp. 1–12. Springer, Berlin (1994).
Rao A.R., Bhimasankaram P.: Linear Algebra. Tata McGraw-Hill, New Delhi (1992).
Rijmen V., Preneel B.: Efficient colour visual encryption or “shared colors of benetton”. Presented at EUROCRYPT ’96 Rump Session.
Shyu S.J.: Efficient visual secret sharing scheme for color images. Pattern Recognit. 39(5), 866–880 (2006).
Shyu S.J.: Image encryption by random grids. Pattern Recognit. 40(3), 1014–1031 (2007).
Shyu S.J.: Image encryption by multiple random grids. Pattern Recognit. 42(7), 1582–1596 (2009).
Verheul E.R., Tilborg V.H.C.A.: Constructions and properties of \(k\) out of \(n\) visual secret sharing schemes. Des. Codes Cryptogr. 11, 179–196 (1997).
Wang D.S., Yi F., Li X.: On general construction for extended visual cryptography schemes. Pattern Recognit. 42(11), 3071–3082 (2009).
Wang D., Yi F., Li X.: Probabilistic visual secret sharing schemes for grey-scale images and color images. Inf. Sci. 181(11), 2189–2208 (2011).
Yang C., Laih C.: New colored visual secret sharing schemes. Des. Codes Cryptogr. 20, 325–335 (2000).
Yang C.-N., Chen T.-S.: Colored visual cryptography scheme based on additive color mixing. Pattern Recognit. 41(10), 3114–3129 (2008).
Yang C.-N., Shih H.-W., Wu C.-C., Harn L.: K out of n region incrementing scheme in visual cryptography. IEEE Trans. Circuits Syst. Video Technol. 22(5), 799–810 (2012).
Acknowledgments
Firstly, we would like to thank the anonymous reviewers for their important and helpful comments. We are also grateful to Professor B K Roy and Professor T K Dutta of Indian Statistical Institute, Kolkata for their important discussions which helped us to a great extent in writing this paper.
Author information
Authors and Affiliations
Corresponding author
Additional information
Communicated by C. Blundo.
Appendices
Appendix 1
In this section we are going to compare our scheme for \((n-1,n)\) threshold case with the schemes proposed in [14] and [10] in terms of pixel expansion and relative contrasts. Let \((m_D, \alpha _D\)), \((m_B, \alpha _B\)) and \((m, \alpha \)) denote respectively the (pixel expansion, relative contrast) pairs of the schemes proposed in [14], Table 1], [10, Lemma 4.4] and this paper respectively. The Table 1 provides a comparison of these parameters.
1.1 \((5,6)\)-VCS
The two matrices represent basis matrices for the (5,6)-VCS obtained using Theorem 2.4.
Both \(S^0\) and \(S^1\) contain some common columns. To obtain better pixel expansion, we delete the common columns. In Table 2, we point out the column numbers to locate the common columns. For example, the column 2 in \(S^0\) is same as column 40 in \(S^1\) and so on.
1.2 \((6,7)\)-VCS
The following two matrices, \(S^0=S^0_1 || S^0_2\) and \(S^1=S^1_1 || S^1_2\) represent basis matrices for the (6,7)-VCS obtained using Theorem 2.4.
In Table 3, we point out the column numbers to locate the common columns.
Appendix 2
Example 7.1
Let us consider the access structure with \(\Gamma _0=\{ \{1,2 \}, \{1,3 \}, \{1,4\},\{2,3,4\}\}\) on the set \(\mathcal P =\{1,2,3,4 \}\) of four participants. We construct the basis matrices by using Theorem 2.4 and illustrate the scheme through Figs. 1, 2, 3, 4, 5, 6, 7, and 8.
Appendix 3
Example 8.1
Let us consider the access structure with \(\Gamma _0=\{ \{1,2 \}, \{1,3 \}\}\) on the set \(\mathcal P =\{1,2,3 \}\) of three participants with color set \(\mathcal C =\{ C,Y,G\}\). We construct the basis matrices by using Theorems 2.4 and 4.2 and illustrate the scheme through Figs. 9, 10, 11, 12, 13, 14, and 15.
Rights and permissions
About this article
Cite this article
Adhikari, A. Linear algebraic techniques to construct monochrome visual cryptographic schemes for general access structure and its applications to color images. Des. Codes Cryptogr. 73, 865–895 (2014). https://doi.org/10.1007/s10623-013-9832-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10623-013-9832-5