Threshold Multi-Secret Visual Cryptography Scheme with Perfect Recovery
Author:
Affiliation:

  • Article
  • | |
  • Metrics
  • |
  • Reference [16]
  • |
  • Related [20]
  • | | |
  • Comments
    Abstract:

    To address the issue of information loss in recovering multiple secret images for threshold structure, this paper develops a definition of threshold multi-secret visual cryptography with perfect recovery, which can adapt to various corresponding relationship between the threshold value and the secret number. Based on the given definition, a single-threshold multi-secret visual cryptography scheme with upper and lower thresholds is constructed, and a multiple-threshold scheme is then proposed by designing the rotation rule fusion algorithm and the region merging algorithm. Furthermore, the effectiveness is proved theoretically and verified by experiments.

    Reference
    [1] Naor M, Shamir A. Visual cryptography. In: Proc. of the Advances in Cryptology-Eurocrypt'94. LNCS, Berlin: Springer-Verlag, 1995. 1-12. [doi: 10.1007/BFb0053419]
    [2] Fu ZX, Yu B. Research on rotation visual cryptography scheme. In: Proc. of the Int'l Symp. on Information Engineering and Electronic Commerce (IEEC 2009). Ternopil: IEEE Computer Society, 2009. 533-536. [doi: 10.1109/IEEC.2009.118]
    [3] Shyu SJ, Chen K. Visual multiple secret sharing based upon turning and flipping. Information Sciences, 2011,181(15):3246-3266. [doi: 10.1016/j.ins.2011.02.003]
    [4] Wu HC, Chang CC. Sharing visual multi-secrets using circle shares. Computer Standards & Interfaces, 2005,134(28):123-135. [doi: 10.1016/j.csi.2004.12.006]
    [5] Shyu SJ, Huang SY, Lee YK, Wang RZ, Chen K. Sharing multiple secrets in visual cryptography. Pattern Recognition, 2007,40(12): 3633-3651. [doi: 10.1016/j.patcog.2007.03.012]
    [6] Hsu HC, Chen TS, Lin YH. The ring shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharing. In: Proc. of the IEEE IEEE Int'l Conf. on Networking, Sensing & Control (ICNSC 2004). IEEE Computer Society, 2004. 996-1001. [doi: 10.1109/ICNSC.2004.1297083]
    [7] Feng JB, Wu HC, Tsai CS, Chang YF, Chu YP. Visual secret sharing for multiple secrets. Pattern Recognition, 2008,41(12): 3572-3581. [doi: 10.1016/j.patcog.2008.05.031]
    [8] Fu ZX, Yu B, Fang LG. The multi-secret visual cryptography based on ring shares. Journal of Electronics & Information Technology, 2010,32(4):880-883 (in Chinese with English abstract). [doi: 10.3724/SP.J.1146.2009.00410]
    [9] Yang CN, Chung TH. A general multi-secret visual cryptography scheme. Optics Communications, 2010,283(24):4949-4962. [doi: 10.1016/j.optcom.2010.07.051]
    [10] Yu B, Shen G. Multi-Secret visual cryptography with deterministic contrast. Multimedia Tools and Applications, 2014,72(2): 1867-1886. [doi: 10.1007/s11042-013-1479-8]
    [11] Katoh T, Imai H. Some visual secret sharing schemes and their share size. In: Proc. of the Int'l Conf. on Cryptology and Information Security, Joint Conf. of '96 Int'l Computer Symp. 1996. 41-47. http://cttir.lib.fcu.edu.tw/FCUWeb/wSite/ct?ctNode= 289&mp=1&xItem=28552&doId=0000017107
    [12] Yu B, Xu XH, Fang LG. Multi-Secret sharing threshold visual cryptography scheme. In: Wang YP, Zhang QF, Liu HL, eds. Proc. of the Int'l Conf. on Computational Intelligence and Security. Harbin: IEEE Computer Society, 2007. 815-818. [doi: 10.1109/ CISW.2007.4425620]
    [13] Qiao MQ, Zhu YD, Liu HP. Multi-Secret sharing visual cryptography and its application to cheater detection. Natural Sciences Journal of Harbin Normal University, 2007,23(2):61-65 (in Chinese with English abstract).
    [14] Yu B, Fu ZX, Fang LG. A modified multi-secret sharing visual cryptography scheme. In: Proc. of the 2008 Int'l Conf. on Computational Intelligence and Security Workshop. Suzhou: IEEE Computer Society, 2008. 351-354. [doi: 10.1109/CIS.2008.120]
    [15] Shyu SJ, Jiang HW. General constructions for threshold multiple-secret visual cryptographic schemes. IEEE Trans. on Information Forensics and Security, 2013,8(5):733-743. [doi: 10.1109/TIFS.2013.2250432]
    [16] Fu ZX, Yu B, Fang LG. A new multi-secret sharing visual cryptography. Acta Electronica Sinica, 2011,39(3):714-718 (in Chinese with English abstract).
    Cited by
    Comments
    Comments
    分享到微博
    Submit
Get Citation

付正欣,沈刚,李斌,郁滨.一种可完全恢复的门限多秘密视觉密码方案.软件学报,2015,26(7):1757-1771

Copy
Share
Article Metrics
  • Abstract:3640
  • PDF: 4956
  • HTML: 1374
  • Cited by: 0
History
  • Received:May 09,2013
  • Revised:March 27,2014
  • Online: July 02,2015
You are the first2051267Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063