A Probabilistic Essential Visual Cryptographic Scheme for Plural Secret Images

  • Kanakkath PraveenEmail author
  • M. Sethumadhavan
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 28)


In order to reduce the pixel expansion of visual cryptography scheme (VCS), many probabilistic schemes were proposed. Let P = {P 1,P 2,P 3,...,P n } be the set of participants. The minimal qualified set for essential VCS is given by Γ0={A: A ⊆ P, P 1 ∈ A and |A| = k}. In this paper we propose a construction of probabilistic essential VCS for sharing plural secret images simultaneously.


Essential Visual Cryptography multiple secrets Probabilistic schemes 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Arumugam, S., Lakshmanan, R., Nagar, A.K.: On (k, n)*-Visual Cryptography Scheme. Designs, Codes and Cryptography (2012)Google Scholar
  2. 2.
    Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual Cryptography for General Access Structures. Information and Computation 129(2), 86–106 (1996)MathSciNetCrossRefzbMATHGoogle Scholar
  3. 3.
    Droste, S.: New Results on Visual Cryptography. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 401–415. Springer, Heidelberg (1996)Google Scholar
  4. 4.
    Iwamoto, M., Yamamoto, H.: A construction method of visual secret sharing schemes for plural secret images. IEICE Transactions on Fundamentals of Electronic Communications and Computer Sciences 86(10) (2003)Google Scholar
  5. 5.
    Praveen, K., Rajeev, K., Sethumadhavan, M.: On the Extensions of (k, n)*-Visual Cryptographic Schemes. In: Martínez Pérez, G., Thampi, S.M., Ko, R., Shu, L. (eds.) SNDS 2014. Communications in Computer and Information Science, vol. 420, pp. 231–238. Springer, Heidelberg (2014)CrossRefGoogle Scholar
  6. 6.
    Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)CrossRefGoogle Scholar
  7. 7.
    Tuyls, P., Hollmann, H.D.L., Lint, J.H.V., Tolhuizen, L.: XOR-based visual cryptography schemes. Designs, Codes and Cryptography 37(1), 169–186 (2005)MathSciNetCrossRefzbMATHGoogle Scholar
  8. 8.
    Yang, C.N.: New Visual Secret Sharing Schemes Using Probabilistic Method. Pattern Recognition Letters 25(4), 481–494 (2004)CrossRefGoogle Scholar
  9. 9.
    Yu, B., Shen, G.: Multi-secret visual cryptography with deterministic contrast. Multimedia Tools and Applications (2013)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.TIFAC CORE in Cyber SecurityAmrita Vishwa VidyapeethamCoimbatoreIndia

Personalised recommendations