Advertisement

Almost Ideal Contrast Visual Cryptography with Reversing

  • Duong Quang Viet
  • Kaoru Kurosawa
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2964)

Abstract

A drawback of visual cryptography schemes (VCS) is much loss of contrast in the reconstructed image. This paper shows that no loss of contrast can be almost achieved if we are allowed to use a very simple non-cryptographic operation, reversing black and white. Many copy machines have this function these days. Therefore, our VCS is very attractive.

Keywords

Visual cryptography ideal contrast perfect black 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Ateniese, G., Blundo, C., Santis, A.D., Stinson, D.R.: Visual cryptography for general access structures. Information and Computation 129, 86–106 (1996)zbMATHCrossRefMathSciNetGoogle Scholar
  2. 2.
    Benaloh, J.C., Leichter, J.: Generalized secret sharing and monotone functions. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 27–36. Springer, Heidelberg (1990)Google Scholar
  3. 3.
    Blundo, C., De. Santis, A.: Visual cryptography schemes with perfect reconstruction of black pixels. Computer and Graphics 22(4), 449–455 (1998)CrossRefGoogle Scholar
  4. 4.
    Blundo, C., De. Santis, A., Stinson, D.R.: On the contrast in visual cryptography schemes. Journal of Cryptology 12(4), 261–289 (1999)zbMATHCrossRefMathSciNetGoogle Scholar
  5. 5.
    Blundo, C., D’Arco, P., De. Santis, A., Stinson, D.R.: Contrast optimal threshold visual cryptography schemes. SIAM Journal on Discrete Mathematics (to appear), Available from http://cacr.math.uwaterloo.ca/~dstinson/papers/COTVCS.ps
  6. 6.
    Blundo, C., De. Bonis, A., De. Santis, A.: Improved schemes for visual cryptography. Designs, Codes, and Cryptography 24, 255–278 (2001)zbMATHCrossRefGoogle Scholar
  7. 7.
    Eisen, P.A., Stinson, D.R.: Threshold Visual Cryptography Schemes With Specified Whiteness Levels of Reconstructed Pixels. Designs, Codes, and Cryptography 25(1), 15–61 (2002)zbMATHCrossRefMathSciNetGoogle Scholar
  8. 8.
    Itoh, M., Saito, A., Nishizeki, T.: Multiple assignment scheme for sharing secret. Journal of Cryptology 6(1), 15–20 (1993)CrossRefMathSciNetGoogle Scholar
  9. 9.
    Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)CrossRefGoogle Scholar
  10. 10.
    Naor, M., Shamir, A.: Visual cryptography II: Improving the Contrast Via the Cover Base. In: Lomas, M. (ed.) Security Protocols 1996. LNCS, vol. 1189, pp. 197–202. Springer, Heidelberg (1997), Full version available from http://www.wisdom.weizmann.ac.il/~naor/PAPERS/new_cov.ps Google Scholar
  11. 11.
    Verheul, E.R., van Tilborg, H.C.A.: Constructions and properties of k out of n visual secret sharing schemes. Designs, Codes, and Cryptography 11(2), 179–196 (1997)zbMATHCrossRefMathSciNetGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Duong Quang Viet
    • 1
  • Kaoru Kurosawa
    • 2
  1. 1.Tokyo Institute of TechnologyTokyoJapan
  2. 2.Department of Computer and Information SciencesIbaraki UniversityHitachi, IbarakiJapan

Personalised recommendations