Construction of Basis Matrices for (k, n) and Progressive Visual Cryptography Schemes
DOI:
https://doi.org/10.26438/ijcse/v6si1.4347Keywords:
Secret sharing scheme, Visual Cryptography, Data hidingAbstract
Security of digital information plays important role to keep the integrity of original media. A secret is something which is kept away from the knowledge of any but those who are privileged to access it. Secret sharing scheme provides a mechanism for sharing secrets among different users securely, where each user receives his part of encoded secret information called as a share. Sufficient number of shares need to be combined together to reconstruct secret information. Text, images, audio and video can be used for sharing secret information in secret sharing scheme. Secret sharing scheme in which secret information is encoded in form of concealed images is called as Visual Cryptography. There are various Visual Cryptography Schemes. Visual Cryptography Scheme’s functionality is dependent on their basis matrices. Constructions of basis matrices for various OR-based and XOR-based Visual Cryptography Schemes are elaborated in this paper.
References
Shamir, A. 1979. How to Share a Secret. Communications of the ACM. 22: 612-613.
Blakely, G. R. 1979. Safeguarding Cryptographic Keys. Proceedings of the National Computer Conference, American Federation of Information Processing Societies Proceedings. 48: 313-317.
Moni Naor and Adi Shamir, “Visual cryptography”. In Proceedings of Advances in Cryptology, EUROCRYPT 94, Lecture Notes in Computer Science, 1995, (950):pp. 1-12.
S. J. Shyu, S. Y. Huanga,Y. K. Lee, R. Z. Wang, andK. Chen, “Sharing multiple secrets in visual cryptography”, Pattern Recognition, Vol. 40, Issue 12, pp. 3633 - 3651, 2007.
Nakajima, M. and Yamaguchi, Y., “Extended visual cryptography for natural images” Journal of WSCG. v10 i2. 303-310.
Jin, W. Q. Yan, and M. S. Kankanhalli, “Progressive color visual cryptography,” J. Electron. Imag., vol. 14, no. 3, pp. 1–13, 2005.
Pim Tuyls, Henk D. L. Hollmann, Jack H. van Lint, and Ludo M. G. M. Tolhuizen. XOR-based visual cryptography schemes. Designs, Codes and Cryptography, 37(1):169–186, 2005
C.-N. Yang and D.-S. Wang, “Property analysis of XOR-based visual cryptography,” IEEE Trans. Circuits Syst. Video Technol., vol. 24, no. 2, pp. 189–197, Feb. 2014.
X. Wu and W. Sun, “Extended capabilities for XOR-based visual cryptography,” IEEE Trans. Inf. Forensics Security, vol. 9, no. 10, pp. 1592–1605, Oct. 2014.
E. Verheuland H. V. Tilborg, ”Constructions And Properties Of K Out Of N Visual Secret Sharing Schemes.”Designs, Codes and Cryptography, 11(2), pp.179–196, 1997.
G. Ateniese, C. Blundo, A. DeSantis, and D. R. Stinson, “Visual cryptography for general access structures”, Proc. ICAL96, Springer, Berlin,1996,pp.416-428.
Jin, W. Q. Yan, and M. S. Kankanhalli, “Progressive color visual cryptography,” J. Electron. Imag., vol. 14, no. 3, pp. 1–13, 2005.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
