Construction of Basis Matrices for (k, n) and Progressive Visual Cryptography Schemes

Authors

  • SB Bhagate Department of Computer Science and Engineering, D.K.T.E.’s Textile and Engineering Institute, Ichalkaranji, India
  • PJ Kulkarni Department of Computer Science and Engineering, Walchand College of Engineering, Sangli, India

DOI:

https://doi.org/10.26438/ijcse/v6si1.4347

Keywords:

Secret sharing scheme, Visual Cryptography, Data hiding

Abstract

Security of digital information plays important role to keep the integrity of original media. A secret is something which is kept away from the knowledge of any but those who are privileged to access it. Secret sharing scheme provides a mechanism for sharing secrets among different users securely, where each user receives his part of encoded secret information called as a share. Sufficient number of shares need to be combined together to reconstruct secret information. Text, images, audio and video can be used for sharing secret information in secret sharing scheme. Secret sharing scheme in which secret information is encoded in form of concealed images is called as Visual Cryptography. There are various Visual Cryptography Schemes. Visual Cryptography Scheme’s functionality is dependent on their basis matrices. Constructions of basis matrices for various OR-based and XOR-based Visual Cryptography Schemes are elaborated in this paper.

References

Shamir, A. 1979. How to Share a Secret. Communications of the ACM. 22: 612-613.

Blakely, G. R. 1979. Safeguarding Cryptographic Keys. Proceedings of the National Computer Conference, American Federation of Information Processing Societies Proceedings. 48: 313-317.

Moni Naor and Adi Shamir, “Visual cryptography”. In Proceedings of Advances in Cryptology, EUROCRYPT 94, Lecture Notes in Computer Science, 1995, (950):pp. 1-12.

S. J. Shyu, S. Y. Huanga,Y. K. Lee, R. Z. Wang, andK. Chen, “Sharing multiple secrets in visual cryptography”, Pattern Recognition, Vol. 40, Issue 12, pp. 3633 - 3651, 2007.

Nakajima, M. and Yamaguchi, Y., “Extended visual cryptography for natural images” Journal of WSCG. v10 i2. 303-310.

Jin, W. Q. Yan, and M. S. Kankanhalli, “Progressive color visual cryptography,” J. Electron. Imag., vol. 14, no. 3, pp. 1–13, 2005.

Pim Tuyls, Henk D. L. Hollmann, Jack H. van Lint, and Ludo M. G. M. Tolhuizen. XOR-based visual cryptography schemes. Designs, Codes and Cryptography, 37(1):169–186, 2005

C.-N. Yang and D.-S. Wang, “Property analysis of XOR-based visual cryptography,” IEEE Trans. Circuits Syst. Video Technol., vol. 24, no. 2, pp. 189–197, Feb. 2014.

X. Wu and W. Sun, “Extended capabilities for XOR-based visual cryptography,” IEEE Trans. Inf. Forensics Security, vol. 9, no. 10, pp. 1592–1605, Oct. 2014.

E. Verheuland H. V. Tilborg, ”Constructions And Properties Of K Out Of N Visual Secret Sharing Schemes.”Designs, Codes and Cryptography, 11(2), pp.179–196, 1997.

G. Ateniese, C. Blundo, A. DeSantis, and D. R. Stinson, “Visual cryptography for general access structures”, Proc. ICAL96, Springer, Berlin,1996,pp.416-428.

Jin, W. Q. Yan, and M. S. Kankanhalli, “Progressive color visual cryptography,” J. Electron. Imag., vol. 14, no. 3, pp. 1–13, 2005.

Downloads

Published

2025-11-12
CITATION
DOI: 10.26438/ijcse/v6si1.4347
Published: 2025-11-12

How to Cite

[1]
S. Bhagate and P. Kulkarni, “Construction of Basis Matrices for (k, n) and Progressive Visual Cryptography Schemes”, Int. J. Comp. Sci. Eng., vol. 6, no. 1, pp. 43–47, Nov. 2025.