Two secret sharing schemes based on Boolean operations

Traditional secret sharing schemes involve complex computation. A visual secret sharing (VSS) scheme decodes the secret without computation, but each shadow is m times as big as the original. Probabilistic VSS solved the computation complexity and space complexity problems at once. In this paper we propose a probabilistic (2,n) scheme for binary images and a deterministic (n,n) scheme for grayscale images. Both use simple Boolean operations and both have no pixel expansion. The (2,n) scheme provides a better contrast and significantly smaller recognized areas than other methods. The (n,n) scheme gives an exact reconstruction.

[1]  Ja-Chen Lin,et al.  Sharing and hiding secret images with size constraint , 2004, Pattern Recognit..

[2]  Mitsugu Iwamoto,et al.  The Optimal n-out-of-n Visual Secret Sharing Scheme for Gray-Scale Images , 2002, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[3]  Chang-Chou Lin,et al.  Visual cryptography for gray-level images by dithering techniques , 2003, Pattern Recognit. Lett..

[4]  Gustavus J. Simmons,et al.  An Introduction to Shared Secret and/or Shared Control Schemes and Their ApplicationThis work was performed at Sandia National Laboratories and supported by the U.S. Department of Energy under contract number DEAC0476DPOO789. , 1992 .

[5]  Moni Naor,et al.  Visual cryptography for grey level images , 2000, Inf. Process. Lett..

[6]  Alfredo De Santis,et al.  Extended capabilities for visual cryptography , 2001, Theor. Comput. Sci..

[7]  Jen-Bang Feng,et al.  A new multi-secret images sharing scheme using Largrange's interpolation , 2005, J. Syst. Softw..

[8]  Stelvio Cimato,et al.  Probabilistic Visual Cryptography Schemes , 2006, Comput. J..

[9]  Douglas R. Stinson,et al.  An explication of secret sharing schemes , 1992, Des. Codes Cryptogr..

[10]  Mitsuru Ito,et al.  Secret sharing scheme realizing general access structure , 1989 .

[11]  Ja-Chen Lin,et al.  Secret image sharing , 2002, Comput. Graph..

[12]  Chin-Chen Chang,et al.  Sharing Secret Omages using Shadow Codebooks , 1998, Inf. Sci..

[13]  R. Ito,et al.  Image Size Invariant Visual Cryptography , 1999 .

[14]  Alfredo De Santis,et al.  On the Contrast in Visual Cryptography Schemes , 1999, Journal of Cryptology.

[15]  Ching-Nung Yang A Note on Efficient Color Visual Encryption , 2002, J. Inf. Sci. Eng..

[16]  Young-Chang Hou,et al.  Visual cryptography for color images , 2003, Pattern Recognit..

[17]  Chin-Chen Chang,et al.  A new (t, n) threshold image hiding scheme for sharing a secret color image , 2003, International Conference on Communication Technology Proceedings, 2003. ICCT 2003..

[18]  Annalisa De Bonis,et al.  Improved Schemes for Visual Cryptography , 2001, Des. Codes Cryptogr..

[19]  Ching-Nung Yang,et al.  New visual secret sharing schemes using probabilistic method , 2004, Pattern Recognit. Lett..

[20]  Ja-Chen Lin,et al.  An image-sharing method with user-friendly shadow images , 2003, IEEE Trans. Circuits Syst. Video Technol..

[21]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[22]  Ching-Nung Yang,et al.  New Colored Visual Secret Sharing Schemes , 2000, Des. Codes Cryptogr..

[23]  Avishek Adhikari,et al.  A New Visual Cryptographic Scheme Using Latin Squares , 2004 .

[24]  Hirosuke Yamamoto,et al.  An Analytic Construction of the Visual Secret Sharing Scheme for Color Images , 2001 .

[25]  Eric R. Verheul,et al.  Constructions and Properties of k out of n Visual Secret Sharing Schemes , 1997, Des. Codes Cryptogr..

[26]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[27]  Alfredo De Santis,et al.  Visual Cryptography for General Access Structures , 1996, Inf. Comput..

[28]  Somnath Sikdar,et al.  A New (2, n)-Visual Threshold Scheme for Color Images , 2003, INDOCRYPT.

[29]  Gustavus J. Simmons,et al.  Contemporary Cryptology: The Science of Information Integrity , 1994 .

[30]  Stelvio Cimato,et al.  Contrast optimal colored visual cryptography schemes , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).

[31]  Ran-Zan Wang,et al.  Secret image sharing with smaller shadow images , 2006, Pattern Recognit. Lett..

[32]  Hans Ulrich Simon,et al.  Contrast-optimal k out of n secret sharing schemes in visual cryptography , 2000, Theor. Comput. Sci..

[33]  G. R. Blakley,et al.  Linear threshold schemes, visual cryptography, and parasite-host cryptosystems , 1998 .