Perfect contrast XOR-based visual cryptography schemes via linear algebra

XOR-based visual cryptography scheme (XVCS) was proposed to solve the poor visual quality problem without darkening the background in the reconstructed secret image. However, investigations on XVCS are not sufficient. In this paper, we focus on the traditional model of VCS for general access structures and exploit some extended capabilities for XVCS. Our main contributions are: (1) we put forward constructions of perfect contrast XVCS using the linear algebraic technique without any assumptions such as participants may carry multiple shares or prior information about the shares are to be submitted during the secret reconstruction phase; (2) for some restricted access structures, we achieve perfect contrast and perfect pixel expansion, namely both 1, which is impossible for any OR-based visual cryptography scheme (OVCS); (3) for general access structures, we achieve perfect contrast with smaller pixel expansion compared with many of the results in the literature; (4) Theoretical analysis on the proposed constructions are provided, as well as extensive experimental results and comparisons for demonstrating the effectiveness and advantages of our constructions.

[1]  Mohan S. Kankanhalli,et al.  Visual cryptography for print and scan applications , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).

[2]  Ching-Nung Yang,et al.  Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality , 2015, Digit. Signal Process..

[3]  Alfredo De Santis,et al.  Measure-independent characterization of contrast optimal visual cryptography schemes , 2013, J. Syst. Softw..

[4]  Eric R. Verheul,et al.  Constructions and Properties of k out of n Visual Secret Sharing Schemes , 1997, Des. Codes Cryptogr..

[5]  Wen-Guey Tzeng,et al.  Cheating Prevention in Visual Cryptography , 2007, IEEE Transactions on Image Processing.

[6]  Bin Yu,et al.  Optimal pixel expansion of deterministic visual cryptography scheme , 2013, Multimedia Tools and Applications.

[7]  Atulya K. Nagar,et al.  On (k, n)*-visual cryptography scheme , 2014, Des. Codes Cryptogr..

[8]  Ching-Nung Yang,et al.  Property Analysis of XOR-Based Visual Cryptography , 2014, IEEE Transactions on Circuits and Systems for Video Technology.

[9]  Feng Liu,et al.  A new definition of the contrast of visual cryptography scheme , 2010, Inf. Process. Lett..

[10]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[11]  Feng Liu,et al.  Visual Cryptography for Natural Images and Visual Voting , 2012, Inscrypt.

[12]  Shyong Jian Shyu,et al.  Minimizing Pixel Expansion in Visual Cryptographic Scheme for General Access Structures , 2015, IEEE Transactions on Circuits and Systems for Video Technology.

[13]  Marten van Dijk,et al.  Visual Crypto Displays Enabling Secure Communications , 2003, SPC.

[14]  Alfredo De Santis,et al.  Visual Cryptography for General Access Structures , 1996, Inf. Comput..

[15]  Shyong Jian Shyu,et al.  General Constructions for Threshold Multiple-Secret Visual Cryptographic Schemes , 2013, IEEE Transactions on Information Forensics and Security.

[16]  Xiaobo Li,et al.  On general construction for extended visual cryptography schemes , 2009, Pattern Recognit..

[17]  Wen Wang,et al.  On (k, n) Visual Cryptography Scheme with t Essential Parties , 2013, ICITS.

[18]  Wei Sun,et al.  Extended Capabilities for XOR-Based Visual Cryptography , 2014, IEEE Transactions on Information Forensics and Security.

[19]  Avishek Adhikari,et al.  Linear algebraic techniques to construct monochrome visual cryptographic schemes for general access structure and its applications to color images , 2013, Designs, Codes and Cryptography.

[20]  Henk D. L. Hollmann,et al.  XOR-based Visual Cryptography Schemes , 2005, Des. Codes Cryptogr..

[21]  WeiQi Yan,et al.  A Comprehensive Study of Visual Cryptography , 2010, Trans. Data Hiding Multim. Secur..

[22]  Feng Liu,et al.  Step Construction of Visual Cryptography Schemes , 2010, IEEE Transactions on Information Forensics and Security.

[23]  Alfredo De Santis,et al.  On the Contrast in Visual Cryptography Schemes , 1999, Journal of Cryptology.

[24]  Shyong Jian Shyu,et al.  Optimum Pixel Expansions for Threshold Visual Secret Sharing Schemes , 2011, IEEE Trans. Inf. Forensics Secur..

[25]  Kaoru Kurosawa,et al.  Almost Ideal Contrast Visual Cryptography with Reversing , 2004, CT-RSA.

[26]  Stelvio Cimato,et al.  Optimal Colored Threshold Visual Cryptography Schemes , 2005, Des. Codes Cryptogr..

[27]  Ching-Nung Yang,et al.  Embed additional private information into two-dimensional bar codes by the visual secret sharing scheme , 2006, Integr. Comput. Aided Eng..

[28]  Moni Naor,et al.  Visual cryptography for grey level images , 2000, Inf. Process. Lett..

[29]  Douglas R. Stinson,et al.  Threshold Visual Cryptography Schemes with Specified Whiteness Levels of Reconstructed Pixels , 2002, Des. Codes Cryptogr..

[30]  Bin Yu,et al.  Multi-secret visual cryptography with deterministic contrast , 2013, Multimedia Tools and Applications.

[31]  Moni Naor,et al.  Visual Authentication and Identification , 1997, CRYPTO.

[32]  Cheehang Park Park,et al.  Visual Cryptography Based on an Interferometric Encryption Technique , 2002 .

[33]  Young-Chang Hou,et al.  Visual cryptography for color images , 2003, Pattern Recognit..