scispace - formally typeset
Journal ArticleDOI

Constructions and analysis of some efficient $$t$$t-$$(k,n)^*$$(k,n)ź-visual cryptographic schemes using linear algebraic techniques

TLDR
An efficient construction and analysis of a closed form for reduced pixel expansion of a VCS for monochrome images in which t participants are essential in a (k,n)∗-visual cryptographic scheme (VCS) and numerical evidence shows it achieves almost optimal pixel expansion.
Abstract
In this paper we put forward an efficient construction, based on linear algebraic technique, of a $$t$$t-$$(k,n)^*$$(k,n)ź-visual cryptographic scheme (VCS) for monochrome images in which $$t$$t participants are essential in a $$(k,n)$$(k,n)-VCS. The scheme is efficient in the sense that it only requires solving a system of linear equations to construct the required initial basis matrices. To make the scheme more efficient, we apply the technique of deletion of common columns from the initial basis matrices to obtain the reduced basis matrices. However finding exact number of common columns in the initial basis matrices is a challenging problem. In this paper we deal with this problem. We first provide a construction and analysis of $$t$$t-$$(k,n)^*$$(k,n)ź-VCS. We completely characterize the case of $$t$$t-$$(n-1,n)^*$$(n-1,n)ź-VCS, $$0 \le t \le n-1$$0≤t≤n-1, by finding a closed form of the exact number of common columns in the initial basis matrices and thereby deleting the common columns to get the exact value of the reduced pixel expansion and relative contrast of the efficient and simple scheme. Our proposed closed form for reduced pixel expansion of $$(n-1,n)$$(n-1,n)-VCS matches with the numerical values of the optimal pixel expansions for every possible values of $$n$$n that exist in the literature. We further deal with the $$(n-2,n)$$(n-2,n)-VCS and resolve an open issue by providing an efficient algorithm for grouping the system of linear equations and thereby show that our proposed algorithm works better than the existing scheme based on the linear algebraic technique. Finally we provide a bound for reduced pixel expansion for $$(n-2,n)$$(n-2,n)-VCS and numerical evidence shows it achieves almost optimal pixel expansion.

read more

Citations
More filters
Journal Article

A general formula of the (t, n)-threshold visual secret sharing scheme

TL;DR: In this article, a new method for construction of the basis matrices of the (t, n)-threshold visual secret sharing scheme (VSSS) for any n ≥ 2 and 2 ≤ t ≤ n.
Journal ArticleDOI

A new lossless secret color image sharing scheme with small shadow size

TL;DR: This work proposes a new lossless secret color image sharing scheme with small shadow size, which directly deals with the three components of the intensities of the RGB values of each color pixel of the secret image.
Journal ArticleDOI

Maximal contrast color visual secret sharing schemes

TL;DR: A generic construction method to share a color image in same color model achieving maximal contrast and a direct and efficient construction of visual secret sharing for monotone access structure.
Journal ArticleDOI

Essential secret image sharing scheme with small and equal sized shadows

TL;DR: The proposed ( t, k, n ) -ESIS scheme for grayscale images over the finite field GF ( p m ) does not require any preprocessing step to secure the scheme and is completely lossless.
Journal ArticleDOI

Distributed Biomedical Scheme for Controlled Recovery of Medical Encrypted Images

TL;DR: A novel threshold based (any value of k and n) blockwide recovery of secret in progressive secret sharing has been introduced and analyzed for distributed environment and satisfies for perfect security condition in distributed environment.
References
More filters
Journal ArticleDOI

Visual Cryptography for General Access Structures

TL;DR: This paper examines graph-based access structures, i.e., access structures in which any qualified set of participants contains at least an edge of a given graph whose vertices represent the participants of the scheme, and provides a novel technique for realizing threshold visual cryptography schemes.
Journal ArticleDOI

Constructions and Properties of k out of nVisual Secret Sharing Schemes

TL;DR: Two general k out of n constructions that are related to those of maximum size arcs or MDS codes and the notion of coloured visual secret sharing schemes is introduced and a general construction is given.
Journal ArticleDOI

Image encryption by random grids

TL;DR: This paper designs algorithms by using random grids to accomplish the encryption of the secret gray-level and color images in such a way that neither of the two encrypted shares alone leaks the information of thesecret image, whereas the secret can be seen when these two shares are superimposed.
Book ChapterDOI

New Results on Visual Cryptography

Stefan Droste
TL;DR: A new principle of construction for k out of n secret sharing schemes is presented which is easy to apply and in most cases gives much better results than the former principlcs.
Posted Content

On the Contrast in Visual Cryptography Schemes.

TL;DR: This paper analyzes the contrast of the reconstructed image in k out of n visual cryptography schemes and gives a complete characterization of schemes having optimal contrast and minimum pixel expansion in terms of certain balanced incomplete block designs.
Related Papers (5)