Optimal XOR Based (2, n)-Visual Cryptography Schemes

A (2, n) Visual Cryptography Scheme (VCS) is a kind of secret sharing scheme, where n participants share a secret image, and any two of them can recover the secret image visually without any cryptographic knowledge and computation devices, but any one of them cannot get any information about the secret image other than the size of the secret image. This paper studies the \((2,n)-VCS_{XOR}\), and shows the smallest (optimal) pixel expansion of such scheme, and the largest possible contrast for the \((2,n)-VCS_{XOR}\) given their optimal pixel expansion. It also shows the largest (optimal) contrast of the \((2,n)-VCS_{XOR}\), and the smallest possible pixel expansion of such schemes given their optimal contrast. The results of this paper show that the \((2,n)-VCS_{XOR}\) can achieve smaller pixel expansion and larger contrast than that of \((2,n)-VCS_{OR}\). It also shows that the construction of the basis matrix of optimal contrast \((2,n)-VCS_{XOR}\) is equivalent to the construction of binary codes when they reach the maximum capability, and the construction of a specific class of optimal contrast \((2,n)-VCS_{XOR}\) for \(n=2^{k}-1\) is given.

[1]  Hu Chuan-Gan,et al.  On The Shift Register Sequences , 2004 .

[2]  Ching-Nung Yang,et al.  Embed additional private information into two-dimensional bar codes by the visual secret sharing scheme , 2006, Integr. Comput. Aided Eng..

[3]  Moni Naor,et al.  Visual Authentication and Identification , 1997, CRYPTO.

[4]  Alexander Vardy,et al.  A table of upper bounds for binary codes , 2001, IEEE Trans. Inf. Theory.

[5]  W. Z. Gandhare,et al.  Secure Iris Authentication Using Visual Cryptography , 2010, ArXiv.

[6]  Douglas R Stinson,et al.  Contemporary design theory : a collection of surveys , 1992 .

[7]  Stelvio Cimato,et al.  Ideal contrast visual cryptography schemes with reversing , 2005, Inf. Process. Lett..

[8]  Marten van Dijk,et al.  Visual Crypto Displays Enabling Secure Communications , 2003, SPC.

[9]  Morris Plotkin,et al.  Binary codes with specified minimum distance , 1960, IRE Trans. Inf. Theory.

[10]  H. Kuwakado,et al.  Size-Reduced Visual Secret Sharing Scheme( Discrete Mathematics and Its Applications) , 2004 .

[11]  Feng Liu,et al.  On the Equivalence of Two Definitions of Visual Cryptography Scheme , 2012, ISPEC.

[12]  Cheehang Park Park,et al.  Visual Cryptography Based on an Interferometric Encryption Technique , 2002 .

[13]  Tzungher Chen,et al.  Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol , 2006, Pattern Recognit..

[14]  Alfredo De Santis,et al.  Visual Cryptography for General Access Structures , 1996, Inf. Comput..

[15]  Feng Liu,et al.  Threshold visual secret sharing by random grids with improved contrast , 2013, J. Syst. Softw..

[16]  Feng Liu,et al.  Step Construction of Visual Cryptography Schemes , 2010, IEEE Transactions on Information Forensics and Security.

[17]  Kaoru Kurosawa,et al.  Almost Ideal Contrast Visual Cryptography with Reversing , 2004, CT-RSA.

[18]  Henk D. L. Hollmann,et al.  XOR-based Visual Cryptography Schemes , 2005, Des. Codes Cryptogr..

[19]  Young-Chang Hou,et al.  Copyright protection scheme for digital images using visual cryptography and sampling methods , 2005 .

[20]  Ching-Nung Yang,et al.  New visual secret sharing schemes using probabilistic method , 2004, Pattern Recognit. Lett..

[21]  N. J. A. Sloane,et al.  A new table of constant weight codes , 1990, IEEE Trans. Inf. Theory.

[22]  Subramania Sudharsanan Shared key encryption of JPEG color images , 2005, IEEE Transactions on Consumer Electronics.

[23]  A. De Santis On visual cryptography schemes , 1998, ITW 1998.

[24]  Alfredo De Santis,et al.  On the Contrast in Visual Cryptography Schemes , 1999, Journal of Cryptology.

[25]  Richard W. Hamming,et al.  Error detecting and error correcting codes , 1950 .

[26]  Eli,et al.  Visual Cryptography with Polarization , 1998 .

[27]  Henk D. L. Hollmann,et al.  A polarisation based Visual Crypto System and its Secret Sharing Schemes , 2002, IACR Cryptol. ePrint Arch..

[28]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[29]  Lakhmi C. Jain,et al.  Multiuser-based shadow watermark extraction system , 2007, Inf. Sci..

[30]  Feng Liu,et al.  Cheating immune visual cryptography scheme , 2011, IET Inf. Secur..

[31]  L. W. Hawkes,et al.  An Application of Visual Cryptography To Financial Documents , 2000 .

[32]  Chin-Chen Chang,et al.  An image intellectual property protection scheme for gray-level images using visual secret sharing strategy , 2002, Pattern Recognit. Lett..

[33]  Feng Liu,et al.  Some Extensions on Threshold Visual Cryptography Schemes , 2010, Comput. J..

[34]  Feng Liu,et al.  Robust visual cryptography-based watermarking scheme for multiple cover images and multiple owners , 2011, IET Inf. Secur..

[35]  Hidenori Kuwakado,et al.  Visual Cryptographic Protocols Using the Trusted Initializer , 2005, ICICS.

[36]  R. Ito,et al.  Image Size Invariant Visual Cryptography , 1999 .

[37]  Ching-Nung Yang,et al.  Property Analysis of XOR-Based Visual Cryptography , 2014, IEEE Transactions on Circuits and Systems for Video Technology.

[38]  Stefan Droste,et al.  New Results on Visual Cryptography , 1996, CRYPTO.

[39]  Der-Chyuan Lou,et al.  A copyright protection scheme for digital images using visual cryptography technique , 2007, Comput. Stand. Interfaces.