Perfect recovery of XOR-based visual cryptography scheme

Visual cryptography is an interesting secret sharing scheme, in which participants can observe the secret image by stacking their shares. However, the size expansion and distorted visual effect are two disadvantages of visual cryptography. In this paper, we focus on how to realize the perfect recovery by XOR-ing shares directly. First, we propose the definition of ideal access structure, which is the key point of perfect recovery of XOR-based visual cryptography scheme. The characteristics of ideal access structure are analyzed, and the construction algorithm of shares under ideal access structure is designed. Based on the ideal access structure, a new algorithm is proposed for dividing the general access structure into several ideal access structures, and the secret sharing and recovering algorithms for general access structure are presented. Furthermore, our method can also be utilized in color visual cryptography and multi-secret visual cryptography. The security and perfect recovery of our method have been proved theoretically. Compared with the previous schemes, the proposed scheme realizes the perfect recovery of secret image by XOR-ing shares directly, and the sizes of shares can be decreased efficiently compared with the previous schemes.

[1]  Kaoru Kurosawa,et al.  Almost Ideal Contrast Visual Cryptography with Reversing , 2004, CT-RSA.

[2]  Lyle H. Ungar,et al.  Beyond Binary Labels: Political Ideology Prediction of Twitter Users , 2017, ACL.

[3]  Ching-Nung Yang,et al.  Visual Cryptography Schemes with Reversing , 2008, Comput. J..

[4]  Ning Ma,et al.  Two secret sharing schemes based on Boolean operations , 2007, Pattern Recognit..

[5]  Li Liu,et al.  Recognizing Complex Activities by a Probabilistic Interval-Based Model , 2016, AAAI.

[6]  Shyong Jian Shyu,et al.  Minimizing Pixel Expansion in Visual Cryptographic Scheme for General Access Structures , 2015, IEEE Transactions on Circuits and Systems for Video Technology.

[7]  Ching-Nung Yang,et al.  $k$ Out of $n$ Region Incrementing Scheme in Visual Cryptography , 2012, IEEE Transactions on Circuits and Systems for Video Technology.

[8]  Luming Zhang,et al.  Fortune Teller: Predicting Your Career Path , 2016, AAAI.

[9]  David S. Rosenblum,et al.  From action to activity: Sensor-based activity recognition , 2016, Neurocomputing.

[10]  Yu-Chi Chen,et al.  Fully Incrementing Visual Cryptography From a Succinct Non-Monotonic Structure , 2017, IEEE Transactions on Information Forensics and Security.

[11]  Feng Liu,et al.  Step Construction of Visual Cryptography Schemes , 2010, IEEE Transactions on Information Forensics and Security.

[12]  Bin Yu,et al.  Optimal pixel expansion of deterministic visual cryptography scheme , 2013, Multimedia Tools and Applications.

[13]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[14]  Ja-Chen Lin,et al.  Secret Image Sharing: a Boolean-Operations-Based Approach Combining Benefits of Polynomial-Based and Fast Approaches , 2009, Int. J. Pattern Recognit. Artif. Intell..

[15]  Henk D. L. Hollmann,et al.  XOR-based Visual Cryptography Schemes , 2005, Des. Codes Cryptogr..

[16]  Luming Zhang,et al.  Action2Activity: Recognizing Complex Activities from Sensor Data , 2015, IJCAI.

[17]  Alfredo De Santis,et al.  Visual Cryptography for General Access Structures , 1996, Inf. Comput..