On the Pixel Expansion of Visual Cryptography Scheme

作者: Teng Guo , Jian Jiao , Feng Liu , Wen Wang

DOI: 10.4018/IJDCF.2017040104

关键词:

摘要: In this paper, we first follow Ateniese et al.'s work that provides upper bounds of the pixel expansion visual cryptography schemesVCSs for more kinds graph access structures, in which require a subset parties can determine secret if they contain an edge G. The constructive are derived by decomposition technique. Then generalize method comparing optimal VCSs with two different structures.

参考文章(19)
D.R. Stinson, Decomposition constructions for secret-sharing schemes IEEE Transactions on Information Theory. ,vol. 40, pp. 118- 125 ,(1994) , 10.1109/18.272461
Adi Shamir, How to share a secret Communications of the ACM. ,vol. 22, pp. 612- 613 ,(1979) , 10.1145/359168.359176
Shyong Jian Shyu, Ming Chiang Chen, Optimum Pixel Expansions for Threshold Visual Secret Sharing Schemes IEEE Transactions on Information Forensics and Security. ,vol. 6, pp. 960- 969 ,(2011) , 10.1109/TIFS.2011.2158096
C. Blundo, A. De Santis, D. R. Stinson, U. Vaccaro, Graph decompositions and secret sharing schemes Journal of Cryptology. ,vol. 8, pp. 39- 64 ,(1995) , 10.1007/BF00204801
M. Naor, A. Shamir, Visual Cryptography ,(1994)
G. R. BLAKLEY, Safeguarding cryptographic keys national computer conference. ,vol. 48, pp. 313- 313 ,(1979) , 10.1109/MARK.1979.8817296
Eric R. Verheul, Henk C. A. van Tilborg, Constructions and Properties of k out of nVisual Secret Sharing Schemes Designs, Codes and Cryptography. ,vol. 11, pp. 179- 196 ,(1997) , 10.1023/A:1008280705142
Avishek Adhikari, Tridib Kumar Dutta, Bimal Roy, A New Black and White Visual Cryptographic Scheme for General Access Structures Progress in Cryptology - INDOCRYPT 2004. pp. 399- 413 ,(2004) , 10.1007/978-3-540-30556-9_31
Carlo Blundo, Annalisa De Bonis, Alfredo De Santis, Improved Schemes for Visual Cryptography Designs, Codes and Cryptography. ,vol. 24, pp. 255- 278 ,(2001) , 10.1023/A:1011271120274
Stefan Droste, New Results on Visual Cryptography international cryptology conference. pp. 401- 415 ,(1996) , 10.1007/3-540-68697-5_30